Sciweavers

675 search results - page 127 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
SENSYS
2003
ACM
14 years 18 days ago
Integrated coverage and connectivity configuration in wireless sensor networks
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Cheny...
MOBICOM
2004
ACM
14 years 24 days ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
STORAGESS
2005
ACM
14 years 28 days ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
SENSYS
2003
ACM
14 years 18 days ago
Timing-sync protocol for sensor networks
Wireless ad-hoc sensor networks have emerged as an interesting and important research area in the last few years. The applications envisioned for such networks require collaborati...
Saurabh Ganeriwal, Ram Kumar, Mani B. Srivastava
WONS
2005
IEEE
14 years 28 days ago
Multipath Associativity Based Routing
Abstract:This paper introduces a series of new multipath routing protocols developed upon Associativity Based Routing (ABR) for wireless ad-hoc networks. ABR selects routes based o...
Patrick McCarthy, Dan Grigoras