Sciweavers

3486 search results - page 323 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
153
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ISPA
2004
Springer
15 years 9 months ago
A Congestion-Aware Search Protocol for Unstructured Peer-to-Peer Networks
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the sca...
Kin Wah Kwong, Danny H. K. Tsang
158
Voted
CISS
2008
IEEE
15 years 10 months ago
Imperfect randomized algorithms for the optimal control of wireless networks
Abstract— We consider a joint randomized scheduling, congestion control mechanism for general wireless networks. We allow for a set of imperfections in the operation of the rando...
Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah...
109
Voted
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 10 months ago
A Collision-free Based Rotational Listening Strategy (RLS) for IEEE 802.15.4 WPAN
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...
Shiann-Tsong Sheu, Yun-Yen Shih
WISEC
2009
ACM
15 years 10 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...