Sciweavers

3971 search results - page 768 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
ITSL
2008
13 years 9 months ago
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact
In this paper we present a randomized complexity theoretic model for those epidemics propagated via short-distance close contact. We prove that the contact-based epidemics problems...
Zhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu
MOBISYS
2009
ACM
14 years 8 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
MOBISYS
2005
ACM
14 years 7 months ago
Deploying and evaluating a location-aware system
Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
Robert K. Harle, Andy Hopper
PERCOM
2009
ACM
14 years 2 months ago
iMAP: Indirect Measurement of Air Pollution with Cellphones
Abstract—In this paper, we introduce the cellphonebased indirect sensing problem. While participatory sensing aims at monitoring of a phenomenon by deploying a dense set of senso...
Murat Demirbas, Carole Rudra, Atri Rudra, Murat Al...
DATE
2007
IEEE
111views Hardware» more  DATE 2007»
14 years 1 months ago
Cost-aware capacity optimization in dynamic multi-hop WSNs
Low energy consumption and load balancing are required for enhancing lifetime at Wireless Sensor Networks (WSN). In addition, network dynamics and different delay, throughput, and...
Jukka Suhonen, Mikko Kohvakka, Mauri Kuorilehto, M...