Sciweavers

798 search results - page 74 / 160
» Statecharts as Protocols for Objects
Sort
View
CONEXT
2007
ACM
15 years 1 months ago
Promoting fluidity in the flow of packets of 802.11 wireless mesh networks
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Adel Aziz, Roger Karrer, Patrick Thiran
CN
2010
103views more  CN 2010»
14 years 12 months ago
Anti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...
ADHOC
2005
170views more  ADHOC 2005»
14 years 11 months ago
An ad hoc networking scheme in hybrid networks for emergency communications
This paper describes an ad hoc networking scheme and routing protocol for emergency communications. The objective of the network is to collect damage assessment information quickl...
Takahiro Fujiwara, Takashi Watanabe
IJNSEC
2007
171views more  IJNSEC 2007»
14 years 11 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
IJISEC
2010
121views more  IJISEC 2010»
14 years 10 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes