Sciweavers

914 search results - page 165 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
JSAC
2011
219views more  JSAC 2011»
13 years 2 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
PERCOM
2005
ACM
14 years 7 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon
DBISP2P
2004
Springer
131views Database» more  DBISP2P 2004»
14 years 1 months ago
Dissemination of Spatial-Temporal Information in Mobile Networks with Hotspots
In this paper we examine the dissemination of reports about resources in mobile networks with hotspots, where hotspots, vehicles and sensors communicate with each other via short-r...
Ouri Wolfson, Bo Xu, Huabei Yin
DEXAW
2004
IEEE
90views Database» more  DEXAW 2004»
13 years 11 months ago
Opportunistic Dissemination of Spatio-Temporal Resource Information in Mobile Peer to Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Ouri Wolfson, Bo Xu
ADHOCNOW
2007
Springer
14 years 1 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf