Sciweavers

2691 search results - page 414 / 539
» Security in Ad Hoc Networks
Sort
View
ISCAS
2005
IEEE
146views Hardware» more  ISCAS 2005»
14 years 3 months ago
A novel approach for network on chip emulation
— Current Systems-On-Chip execute applications that demand extensive parallel processing. Networks-On-Chip (NoC) provide a structured way of realizing interconnections on silicon...
Nicolas Genko, David Atienza, Giovanni De Micheli,...
GLOBECOM
2010
IEEE
13 years 8 months ago
Risk-Aware Response for Mitigating MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu
ACSAC
2007
IEEE
14 years 4 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
ALGOSENSORS
2006
Springer
14 years 1 months ago
A Flexible Algorithm for Sensor Network Partitioning and Self-partitioning Problems
Abstract. Motivated by the need for agent classification in sensor networking and autonomous vehicle control applications, we propose a flexible and distributed stochastic automato...
Sandip Roy, Yan Wan, Ali Saberi
COMCOM
2006
80views more  COMCOM 2006»
13 years 10 months ago
A framework for seamless service interworking in ad-hoc networks
Local area wireless networks are becoming commonplace in our everyday lives. It would be beneficial to establish such wireless networks in an ad-hoc manner so that they are infras...
Linda Källström, Simone Leggio, Jukka Ma...