Sciweavers

2189 search results - page 437 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
13 years 8 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
MOBISYS
2008
ACM
14 years 8 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 2 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
IEICET
2007
93views more  IEICET 2007»
13 years 8 months ago
Experimental Evaluation of Decision Criteria for WLAN Handover: Signal Strength and Frame Retransmission
Abstract. In ubiquitous networks, Mobile Nodes (MNs) may often suffer from performance degradation due to the following two reasons: (1) reduction of signal strength by an MN’s m...
Kazuya Tsukamoto, Takeshi Yamaguchi, Shigeru Kashi...
ATAL
2011
Springer
12 years 8 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...