Sciweavers

929 search results - page 122 / 186
» On Computation and Communication with Small Bias
Sort
View
HUC
2010
Springer
13 years 9 months ago
SNUPI: sensor nodes utilizing powerline infrastructure
A persistent concern of wireless sensors is the power consumption required for communication, which presents a significant adoption hurdle for practical ubiquitous computing appli...
Gabe Cohn, Erich P. Stuntebeck, Jagdish Pandey, Br...
INFOCOM
2008
IEEE
14 years 3 months ago
The Inframetric Model for the Internet
—A large amount of algorithms has recently been designed for the Internet under the assumption that the distance defined by the round-trip delay (RTT) is a metric. Moreover, man...
Pierre Fraigniaud, Emmanuelle Lebhar, Laurent Vien...
EUC
2005
Springer
14 years 2 months ago
Coverage-Aware Sensor Engagement in Dense Sensor Networks
Wireless sensor networks are capable of carrying out surveillance missions for various applications in remote areas without human interventions. An essential issue of sensor netwo...
Jun Lu, Lichun Bao, Tatsuya Suda
SASN
2004
ACM
14 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 15 days ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine