Sciweavers

477 search results - page 37 / 96
» Removing even crossings
Sort
View
ICNP
2009
IEEE
13 years 6 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
CN
2011
117views more  CN 2011»
13 years 3 months ago
Cross-layer design in multihop wireless networks
In this paper, we take a holistic approach to the protocol architecture design in multihop wireless networks. Our goal is to integrate various protocol layers into a rigorous fram...
Lijun Chen, Steven H. Low, John C. Doyle
ISBI
2011
IEEE
13 years 14 days ago
Differential information content in staggered multiple shell hardi measured by the tensor distribution function
Diffusion tensor imaging has accelerated the study of brain connectivity, but single-tensor diffusion models are too simplistic to model fiber crossing and mixing. Hybrid diffusio...
Liang Zhan, Alex D. Leow, Iman Aganj, Christophe L...
PERCOM
2005
ACM
14 years 8 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
APLAS
2009
ACM
14 years 3 months ago
On the Decidability of Subtyping with Bounded Existential Types
Bounded existential types are a powerful language feature ling partial data abstraction and information hiding. However, existentials do not mingle well with subtyping as found in ...
Stefan Wehr, Peter Thiemann