Sciweavers

1612 search results - page 316 / 323
» About models of security protocols
Sort
View
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
14 years 1 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
ADHOC
2010
138views more  ADHOC 2010»
13 years 8 months ago
On the feasibility of UMTS-based Traffic Information Systems
Intelligent Transportation Systems (ITS) are a hot topic in the communications society. Currently, research is primarily focusing on setting up Vehicular Ad Hoc Networks (VANETs) ...
Christoph Sommer, Armin Schmidt, Yi Chen, Reinhard...
JPDC
2007
209views more  JPDC 2007»
13 years 8 months ago
Application-aware integration of data collection and power management in wireless sensor networks
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysi...
Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
MOBISYS
2004
ACM
14 years 8 months ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
SOSP
2005
ACM
14 years 5 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...