Sciweavers

560 search results - page 98 / 112
» The Speed of Information Propagation in Large Wireless Netwo...
Sort
View
INFOCOM
2003
IEEE
14 years 1 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
ARC
2009
Springer
241views Hardware» more  ARC 2009»
14 years 3 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 8 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
MOBIHOC
2006
ACM
14 years 8 months ago
Data storage placement in sensor networks
Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. This paper introduces stora...
Bo Sheng, Qun Li, Weizhen Mao
EWSN
2008
Springer
14 years 8 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer