Sciweavers

2691 search results - page 453 / 539
» Security in Ad Hoc Networks
Sort
View
DSN
2004
IEEE
14 years 1 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
DSOM
2006
Springer
14 years 1 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
SCN
2010
Springer
120views Communications» more  SCN 2010»
13 years 4 months ago
Identity crisis: on the problem of namespace design for ID-PKC and MANETs
In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
SIGOPSE
2004
ACM
14 years 3 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...
NETWORKING
2007
13 years 11 months ago
Interference-Aware Multicasting in Wireless Mesh Networks
Multicasting is one of the most important applications in Wireless Ad hoc Networks and the currently emerging Wireless Mesh Networks. In such networks, interference due to the shar...
Sudheendra Murthy, Abhishek Goswami, Arunabha Sen