Sciweavers

1506 search results - page 193 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
160
Voted
TMC
2011
164views more  TMC 2011»
14 years 10 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
152
Voted
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Anonymous Data Collection in Sensor Networks
—Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable...
James Horey, Michael M. Groat, Stephanie Forrest, ...
GLOBECOM
2009
IEEE
15 years 1 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
152
Voted
VTC
2007
IEEE
198views Communications» more  VTC 2007»
15 years 10 months ago
A Distributed Node Scheduling Protocol Considering Sensing Coverage in Wireless Sensor Networks
Abstract— A crucial issue in deploying wireless sensor networks is to perform a sensing task in an area of interest in an energy-efficient manner since sensor nodes have limited...
Jaekyu Cho, Gilsoo Kim, Taekyoung Kwon, Yanghee Ch...
136
Voted
WS
2004
ACM
15 years 9 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner