Sciweavers

646 search results - page 97 / 130
» Sharing multiple messages over mobile networks
Sort
View
EPEW
2007
Springer
14 years 3 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
ICON
2007
IEEE
14 years 3 months ago
Congestion Aware Routing in Hybrid Wireless Mesh Networks
— Multi-radio Wireless Mesh Networks (WMN) are gaining lot of popularity owing to their increased application to community and public safety networks. WMNs form a static wireless...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann
DCOSS
2009
Springer
14 years 3 months ago
Finding Symbolic Bug Patterns in Sensor Networks
Abstract. This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous behavior in sensor networks. Often multipl...
Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Ji...
SIGMETRICS
2003
ACM
115views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Measuring the effects of internet path faults on reactive routing
Empirical evidence suggests that reactive routing systems improve resilience to Internet path failures. They detect and route around faulty paths based on measurements of path per...
Nick Feamster, David G. Andersen, Hari Balakrishna...
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 6 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena