Sciweavers

858 search results - page 95 / 172
» User Authentication in Sensor Networks
Sort
View
WINET
2011
14 years 4 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
IPSN
2005
Springer
15 years 3 months ago
Design of a wireless sensor network platform for detecting rare, random, and ephemeral events
— We present the design of the eXtreme Scale Mote, a new sensor network platform for reliably detecting and classifying, and quickly reporting, rare, random, and ephemeral events...
Prabal Dutta, Mike Grimmer, Anish Arora, Steven B....
IEEEARES
2006
IEEE
15 years 4 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu
CIA
2003
Springer
15 years 3 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler
SIGMOD
2006
ACM
208views Database» more  SIGMOD 2006»
15 years 10 months ago
Data management for a smart earth: the Swiss NCCR-MICS initiative
The Swiss National Competence Center for Research in mobile Information and Communication Systems (NCCR-MICS or MICS) is one of several research initiatives sponsored by the Swiss...
Karl Aberer, Gustavo Alonso, Donald Kossmann