Sciweavers

688 search results - page 97 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
134
Voted
TIFS
2008
154views more  TIFS 2008»
15 years 2 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
97
Voted
IPSN
2005
Springer
15 years 8 months ago
Sensing capacity for discrete sensor network applications
We bound the number of sensors required to achieve a desired level of sensing accuracy in a discrete sensor network application (e.g. distributed detection). We model the state of...
Yaron Rachlin, Rohit Negi, Pradeep K. Khosla
147
Voted
SASN
2003
ACM
15 years 7 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
RTCSA
2005
IEEE
15 years 8 months ago
RTPS Middleware for Real-Time Distributed Industrial Vision Systems
Designing and constructing Real-Time Distributed Industrial Vision Systems (RT-DIVS) from scratch is very complicated task. RT-DIVS has Conflicting requirements such as reasonable...
Basem Almadani
JNSM
2000
136views more  JNSM 2000»
15 years 2 months ago
Active Management Framework for Distributed Multimedia Systems
The successful deployment of next-generation distributed multimedia systems is signi cantly dependent on the e cient management support that improves the performance and the relia...
Ehab S. Al-Shaer