Sciweavers

2282 search results - page 451 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
DCOSS
2011
Springer
12 years 7 months ago
Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs
—Controlled sink mobility has been shown to be very beneficial in lifetime prolongation of wireless sensor networks (WSNs) by avoiding the typical hot-spot problem near the sink...
Wint Yi Poe, Michael Beck, Jens B. Schmitt
MOBICOM
2004
ACM
14 years 24 days ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
GI
2004
Springer
14 years 23 days ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
MMB
2010
Springer
194views Communications» more  MMB 2010»
14 years 5 days ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
ITIIS
2010
223views more  ITIIS 2010»
13 years 5 months ago
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs
Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...