Sciweavers

2571 search results - page 30 / 515
» Approximation schemes for wireless networks
Sort
View
IWCMC
2006
ACM
14 years 22 days ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
PERCOM
2007
ACM
14 years 6 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
ICC
2009
IEEE
145views Communications» more  ICC 2009»
14 years 1 months ago
Buffer Schemes for VBR Video Streaming over Heterogeneous Wireless Networks
—With the co-existence of different wireless networks, which exhibit largely different bandwidth and coverage characteristics, much interest has been involved in integrating thes...
Guang Ji, Ben Liang, Aladdin Saleh
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
11 years 9 months ago
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
—Shortest distance query between two nodes is a fundamental operation in large-scale networks. Most existing methods in the literature take a landmark embedding approach, which s...
Miao Qiao, Hong Cheng, Lijun Chang, Jeffrey Xu Yu
GLOBECOM
2010
IEEE
13 years 4 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate