Sciweavers

2691 search results - page 460 / 539
» Security in Ad Hoc Networks
Sort
View
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 9 months ago
Polynomial Filtering for Fast Convergence in Distributed Consensus
Abstract--In the past few years, the problem of distributed consensus has received a lot of attention, particularly in the framework of ad hoc sensor networks. Most methods propose...
Effrosini Kokiopoulou, Pascal Frossard
TMC
2010
104views more  TMC 2010»
13 years 8 months ago
On Nodal Encounter Patterns in Wireless LAN Traces
—In this paper we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider an important event between mobile nodes in wirele...
Wei-jen Hsu, Ahmed Helmy
ITIIS
2010
247views more  ITIIS 2010»
13 years 4 months ago
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing
In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic ...
Nadir Shah, Depei Qian
ICASSP
2008
IEEE
14 years 4 months ago
Stability analysis of the consensus-based distributed LMS algorithm
We deal with consensus-based online estimation and tracking of (non-) stationary signals using ad hoc wireless sensor networks (WSNs). A distributed (D-) least-mean square (LMS) l...
Ioannis D. Schizas, Gonzalo Mateos, Georgios B. Gi...
SAC
2009
ACM
14 years 4 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni