Sciweavers

1498 search results - page 260 / 300
» Collection tree protocol
Sort
View
WISEC
2010
ACM
13 years 8 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ICCCN
2007
IEEE
13 years 7 months ago
Dual-Sink: Using Mobile and Static Sinks for Lifetime Improvement in Wireless Sensor Networks
—Mobile sink has been adopted by many schemes for lifetime improvement in wireless sensor networks. It is necessary to propagate the topological or location changes caused by the...
Xiaobing Wu, Guihai Chen
CCR
2008
122views more  CCR 2008»
13 years 7 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
DC
2008
13 years 7 months ago
Solo-valency and the cost of coordination
This paper introduces solo-valency, a variation on the valency proof technique originated by Fischer, Lynch, and Paterson. The new technique focuses on critical events that influe...
Danny Hendler, Nir Shavit
CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 7 months ago
Quantitative Measurements of the Influence of Participant Roles during Peer Review Meetings
Peer review meetings (PRMs) are formal meetings during which peers systematically analyze artifacts to improve their quality and report on non-conformities. This paper presents an...
Patrick d'Astous, Pierre N. Robillard, Franç...