Sciweavers

738 search results - page 56 / 148
» Security considerations in ad hoc sensor networks
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Similarity-aware query processing in sensor networks
We assume a sensor network with data-centric storage, where sensor data is stored within the sensor network and ad hoc queries are disseminated and processed inside the network. I...
Ping Xia, Panos K. Chrysanthis, Alexandros Labrini...
PERVASIVE
2004
Springer
14 years 2 months ago
A Distributed Precision Based Localization Algorithm for Ad-Hoc Networks
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the dista...
Leon Evers, Stefan Dulman, Paul J. M. Havinga
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 3 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
GLOBECOM
2007
IEEE
14 years 3 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...
JCS
2007
84views more  JCS 2007»
13 years 8 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu