Sciweavers

696 search results - page 133 / 140
» Mobility Models and Behavioural Equivalence for Wireless Net...
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
Provably Correct Pervasive Computing Environments
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However, there are currently no mechanisms for describing the properties and capabil...
Anand Ranganathan, Roy H. Campbell
RAID
2004
Springer
14 years 28 days ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
MOBISYS
2009
ACM
14 years 8 months ago
PEIR, the personal environmental impact report, as a platform for participatory sensing systems research
PEIR, the Personal Environmental Impact Report, is a participatory sensing application that uses location data sampled from everyday mobile phones to calculate personalized estima...
Min Mun, Sasank Reddy, Katie Shilton, Nathan Yau, ...
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
DSRT
2009
IEEE
13 years 11 months ago
Switching to High Gear: Opportunities for Grand-Scale Real-Time Parallel Simulations
The recent emergence of dramatically large computational power, spanning desktops with multicore processors and multiple graphics cards to supercomputers with 105 processor cores,...
Kalyan S. Perumalla