Sciweavers

10492 search results - page 2012 / 2099
» Challenges of Grid Computing
Sort
View
174
Voted
SASN
2006
ACM
15 years 8 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
230
Voted
SENSYS
2006
ACM
15 years 8 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
112
Voted
SENSYS
2006
ACM
15 years 8 months ago
StarDust: a flexible architecture for passive localization in wireless sensor networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, en...
Radu Stoleru, Pascal Vicaire, Tian He, John A. Sta...
125
Voted
VRST
2006
ACM
15 years 8 months ago
Simple user-generated motion cueing can enhance self-motion perception (Vection) in virtual reality
Despite amazing advances in the visual quality of virtual environments, affordable-yet-effective self-motion simulation still poses a major challenge. Using a standard psychophysi...
Bernhard E. Riecke
WS
2006
ACM
15 years 8 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
« Prev « First page 2012 / 2099 Last » Next »