Sciweavers

236 search results - page 18 / 48
» RBVO Formation Protocol
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
AHS
2006
IEEE
167views Hardware» more  AHS 2006»
14 years 4 months ago
A Novel Self-Organizing Hybrid Network Protocol for Wireless Sensor Networks
Recent development of Wireless Sensor Networks (WSN) has led to the appearance of many application specific communication protocols which must be energy-efficient. Among those pro...
Jichuan Zhao, Ahmet T. Erdogan
CCGRID
2003
IEEE
14 years 3 months ago
Supporting Peer-to-Peer Computing with FlexiNet
Formation of suitable overlay-network topologies that are able to reflect the structure of the underlying network-infrastructure, has rarely been addressed by peer-to-peer applic...
Thomas Fuhrmann
FC
2010
Springer
191views Cryptology» more  FC 2010»
14 years 1 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg
DALT
2006
Springer
14 years 1 months ago
Agreeing on Defeasible Commitments
Social commitments are developed for multi-agent systems according to the current practice in law regarding contract formation and breach. Deafeasible commitments are used to provi...
Ioan Alfred Letia, Adrian Groza