Sciweavers

361 search results - page 67 / 73
» Attack Detection in Wireless Localization
Sort
View
DEXAW
2004
IEEE
90views Database» more  DEXAW 2004»
13 years 11 months ago
Opportunistic Dissemination of Spatio-Temporal Resource Information in Mobile Peer to Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Ouri Wolfson, Bo Xu
OSDI
2004
ACM
14 years 7 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
14 years 1 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
AINA
2007
IEEE
14 years 1 months ago
Multi-Stage Real Time Health Monitoring via ZigBee in Smart Homes
We present a framework for a wireless health monitoring system within a smart home using ZigBee technology. Vital signals are collected and processed using a 3-tiered architecture...
S. Dagtas, G. Pekhteryev, Zafer Sahinoglu
MOBISYS
2003
ACM
14 years 7 months ago
The Lighthouse Location System for Smart Dust
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
Kay Römer