Sciweavers

664 search results - page 122 / 133
» Toward resilient security in wireless sensor networks
Sort
View
DIALM
2005
ACM
125views Algorithms» more  DIALM 2005»
14 years 11 months ago
Minimizing interference in ad hoc and sensor networks
Reducing interference is one of the main challenges in wireless communication, and particularly in ad hoc networks. The amount of interference experienced by a node v corresponds ...
Thomas Moscibroda, Roger Wattenhofer
PERCOM
2009
ACM
15 years 10 months ago
iLamp: A Sensor-Enhanced Lamp with Surface-Tracking Capability Based on Light Intensity
The iLamp1 system is a sensor-enhanced desk lamp with surface-tracking capability based on received light intensity. It consists of two components: lamp and bookmark. The bookmark ...
Lun-Wu Yeh, Che-Yen Lu, Yu-Hsuan Lin, Jia-Liang Li...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CCS
2009
ACM
15 years 4 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
CCS
2009
ACM
15 years 10 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...