Sciweavers

1647 search results - page 175 / 330
» Distributing private data in challenged network environments
Sort
View
JSAC
2006
114views more  JSAC 2006»
15 years 4 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
CIDR
2003
138views Algorithms» more  CIDR 2003»
15 years 6 months ago
AIMS: An Immersidata Management System
We introduce a system to address the challenges involved in managing the multidimensional sensor data streams generated within immersive environments. We call this data type, imme...
Cyrus Shahabi
CN
2007
148views more  CN 2007»
15 years 4 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
160
Voted
AINA
2009
IEEE
15 years 11 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
DKE
2007
116views more  DKE 2007»
15 years 4 months ago
A concurrent rule scheduling algorithm for active rules
The use of rules in a distributed environment creates new challenges for the development of active rule execution models. In particular, since a single event can trigger multiple ...
Ying Jin, Susan Darling Urban, Suzanne W. Dietrich