Sciweavers

2691 search results - page 374 / 539
» Security in Ad Hoc Networks
Sort
View
PDPTA
2004
13 years 11 months ago
Agent-Based Embedded Monitoring System for Ubiquitous Networks Environments
Contrary to current wireless network systems, ubiquitous network environment has quite dynamic and diversified devices which aim at best meeting the requirements of specific group ...
Hyo-Sung Kang, Jong-Mu Choi, Jai-Hoon Kim, Young-B...
OPODIS
2010
13 years 8 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
JUCS
2006
117views more  JUCS 2006»
13 years 10 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
IJITN
2010
177views more  IJITN 2010»
13 years 7 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
ESAS
2006
Springer
14 years 2 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...