Sciweavers

2421 search results - page 110 / 485
» Message from the Co-Chairs
Sort
View
MOBIHOC
2007
ACM
14 years 8 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
LCN
2008
IEEE
14 years 3 months ago
Priority interrupts of Duty Cycled communications in wireless sensor networks
— FrameComm is a contention based, Duty Cycled, MAC protocol that ensures a message will be transmitted during the receiver’s listen phase by sending a packet, followed by a sh...
Tony O'Donovan, Jonathan P. Benson, Utz Roedig, Co...
SI3D
2005
ACM
14 years 2 months ago
Interest management middleware for networked games
In this paper we present an implementation of an interest management scheme using standard message oriented middleware (MOM) technologies to provide scalable message dissemination...
Graham Morgan, Fengyun Lu, Kier Storey
EVOW
2004
Springer
14 years 2 months ago
A Scenario-Based Approach to Protocol Design Using Evolutionary Techniques
An evolutionary approach to design communication protocols from scenario-based specifications is presented. It enables to automatically generate finite-state models of protocol ent...
Sérgio G. Araújo, Antônio C. M...
EPEW
2007
Springer
14 years 1 months ago
An Efficient Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), broadcasting plays a fundamental role, diffusing a message from a given source node to all the other nodes in the network. Flooding is the simpl...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...