Sciweavers

2691 search results - page 512 / 539
» Security in Ad Hoc Networks
Sort
View
MOBIHOC
2004
ACM
14 years 3 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
INFOCOM
2005
IEEE
14 years 3 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
ICSE
2004
IEEE-ACM
14 years 10 months ago
A Framework for Ensuring and Improving Dependability in Highly Distributed Systems
A distributed software system's deployment architecture can have a significant impact on the system's dependability. Dependability is a function of various system paramet...
Sam Malek, Nels Beckman, Marija Mikic-Rakic, Nenad...
ICRA
2009
IEEE
119views Robotics» more  ICRA 2009»
14 years 4 months ago
Rapid pole climbing with a quadrupedal robot
— This paper describes the development of a legged robot designed for general locomotion of complex terrain but specialized for dynamical, high-speed climbing of a uniformly conv...
G. Clark Haynes, Alex Khripin, Goran Lynch, Jonath...