Sciweavers

294 search results - page 55 / 59
» Efficient Confirmer Signatures from the
Sort
View
MOBIHOC
2008
ACM
14 years 9 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
ICON
2007
IEEE
14 years 4 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
ACMACE
2004
ACM
14 years 3 months ago
AR-bowling: immersive and realistic game play in real environments using augmented reality
The game and entertainment industry plays an enormous role within the development and extensive usage of new technologies. They are one major technology driver concerning the deve...
Carsten Matysczok, Rafael Radkowski, Jan Berssenbr...
CN
2008
117views more  CN 2008»
13 years 10 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
COMGEO
2006
ACM
13 years 9 months ago
Cost prediction for ray shooting in octrees
The ray shooting problem arises in many different contexts and is a bottleneck of ray tracing in computer graphics. Unfortunately, theoretical solutions to the problem are not ver...
Boris Aronov, Hervé Brönnimann, Allen ...