Sciweavers

1990 search results - page 389 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
CHI
2005
ACM
13 years 9 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
SASN
2003
ACM
14 years 27 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
MOBIHOC
2008
ACM
14 years 7 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
IPSN
2004
Springer
14 years 1 months ago
Nonparametric belief propagation for self-calibration in sensor networks
Automatic self-calibration of ad-hoc sensor networks is a critical need for their use in military or civilian applications. In general, self-calibration involves the combination o...
Alexander T. Ihler, John W. Fisher III, Randolph L...
CEAS
2008
Springer
13 years 9 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao