Sciweavers

1748 search results - page 248 / 350
» Service Discovery Protocol in Wireless Sensor Networks
Sort
View
WIMOB
2008
IEEE
15 years 10 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
SIGMOD
2003
ACM
121views Database» more  SIGMOD 2003»
16 years 4 months ago
An environmental sensor network to determine drinking water quality and security
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...
JSAC
2010
122views more  JSAC 2010»
15 years 2 months ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
119
Voted
WONS
2005
IEEE
15 years 9 months ago
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
Due to the mobility of nodes in Ad hoc networks, network topology is dynamic and unpredictable, which leads to frequent network partitioning. This partitioning disconnects many no...
Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bo...
SASN
2003
ACM
15 years 9 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...