Sciweavers

3971 search results - page 746 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
ISCI
2008
66views more  ISCI 2008»
13 years 10 months ago
An energy-efficient real-time scheduling scheme on dual-channel networks
The recent evolution of wireless sensor networks have yielded a demand to improve energy-efficient scheduling algorithms and energy-efficient medium access protocols. This paper p...
Mikyung Kang, Dong-In Kang, Jinwoo Suh, Junghoon L...
PVLDB
2008
134views more  PVLDB 2008»
13 years 9 months ago
Evita raced: metacompilation for declarative networks
Declarative languages have recently been proposed for many new applications outside of traditional data management. Since these are relatively early research efforts, it is import...
Tyson Condie, David Chu, Joseph M. Hellerstein, Pe...
GLOBECOM
2010
IEEE
13 years 8 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
CSE
2009
IEEE
14 years 5 months ago
The Importance of Data Collection for Modelling Contact Networks
—The recently developed small wireless devices ranging from sensor boards to mobile phones provide a timely opportunity to gather unique data sets on complex human interactions, ...
Eiko Yoneki
SASN
2003
ACM
14 years 3 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee