Sciweavers

914 search results - page 179 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
PERCOM
2008
ACM
14 years 2 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel
IJMMS
2007
166views more  IJMMS 2007»
13 years 7 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...
ACSC
2004
IEEE
13 years 11 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
WCNC
2010
IEEE
13 years 11 months ago
Many-To-Many Communications via Space-Time Network Coding
—In this paper, the mutual cooperative communication between multiple nodes in a wireless network is efficiently achieved through a novel concept of Space-Time Network Coding (S...
Mohammed W. Baidas, Hung-Quoc Lai, K. J. Ray Liu