Sciweavers

1934 search results - page 254 / 387
» Radio Networks with Reliable Communication
Sort
View
CACM
2000
143views more  CACM 2000»
15 years 3 months ago
Embedding Robots into the Internet
With the explosive growth of embedded computing hardware, it is possible to conceive many new networked robotic applications for diverse domains ranging from urban search and resc...
Gaurav S. Sukhatme, Maja J. Mataric
WMASH
2004
ACM
15 years 9 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
INTERSENSE
2006
ACM
15 years 10 months ago
Multipath virtual sink architecture for wireless sensor networks in harsh environments
Wireless sensor networks are expected to be deployed in harsh environments characterized by extremely poor and fluctuating channel conditions. With the generally adopted single-s...
Winston Khoon Guan Seah, Hwee Pink Tan
GLOBECOM
2006
IEEE
15 years 10 months ago
Survivable Wireless Access Network Design with Dual-homing Capabilities
— With the growth of mobile users and the increasing deployment of wireless access network infrastructures, the issue of quality of service is becoming an important component of ...
Mohammad Masud Hasan, Xiaodong Huang, Jason P. Jue
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 11 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald