Sciweavers

1647 search results - page 200 / 330
» Distributing private data in challenged network environments
Sort
View
ICS
2003
Tsinghua U.
15 years 9 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
269
Voted
RTAS
2011
IEEE
14 years 8 months ago
ARCH: Practical Channel Hopping for Reliable Home-Area Sensor Networks
Abstract—Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of...
Mo Sha, Gregory Hackmann, Chenyang Lu
172
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
A node discovery service for partially mobile sensor networks
Wireless Sensor Networks (WSNs) are challenging types of networks where resources can be scarce. In particular, battery is often a very limited resource and the radio interface is...
Vladimir Dyo, Cecilia Mascolo
GECCO
2010
Springer
183views Optimization» more  GECCO 2010»
15 years 9 months ago
Neuroevolution of mobile ad hoc networks
This paper describes a study of the evolution of distributed behavior, specifically the control of agents in a mobile ad hoc network, using neuroevolution. In neuroevolution, a p...
David B. Knoester, Heather Goldsby, Philip K. McKi...
INFOCOM
2012
IEEE
13 years 7 months ago
Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum
—Recent advances in cognitive radio (CR) technology have brought about a number of wireless standards that support opportunistic access to available white-space spectrum. Address...
Bo Gao, Jung-Min Park 0001, Yaling Yang