Sciweavers

620 search results - page 84 / 124
» The computational power of population protocols
Sort
View
DCOSS
2008
Springer
14 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
IEEEPACT
2009
IEEE
15 years 4 months ago
DDCache: Decoupled and Delegable Cache Data and Metadata
Abstract—In order to harness the full compute power of manycore processors, future designs must focus on effective utilization of on-chip cache and bandwidth resources. In this p...
Hemayet Hossain, Sandhya Dwarkadas, Michael C. Hua...
SIGCOMM
2009
ACM
15 years 4 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
APNOMS
2007
Springer
15 years 3 months ago
A Routing Scheme for Supporting Network Mobility of Sensor Network Based on 6LoWPAN
Network Mobility (NEMO) and IPv6 over Low power Wireless PAN (6LoWPAN) protocols are the two significant important technologies in the current networking research areas and seem to...
Jin Ho Kim, Choong Seon Hong, Koji Okamura
PAM
2007
Springer
15 years 3 months ago
TCP over CDMA2000 Networks: A Cross-Layer Measurement Study
Modern cellular channels in 3G networks incorporate sophisticated power control and dynamic rate adaptation which can have a significant impact on adaptive transport layer protoco...
Karim Mattar, Ashwin Sridharan, Hui Zang, Ibrahim ...