Sciweavers

143 search results - page 23 / 29
» Encryption overhead in embedded systems and sensor network n...
Sort
View
ICCCN
2007
IEEE
14 years 4 months ago
Evaluating Mobile Ad Hoc Networks: A Performance Index and Statistical Model
Abstract— This work is concerned with definining a performance index that can be used as an objective measure in the evaluation and comparison of ad hoc networking protocols. Sp...
Ikhlas Ajbar, Dmitri D. Perkins
MSWIM
2009
ACM
14 years 5 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
MOBIHOC
2008
ACM
14 years 10 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
ITCC
2005
IEEE
14 years 4 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 10 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack