Sciweavers

2337 search results - page 407 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
EUROCRYPT
1990
Springer
13 years 11 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
JSAC
2007
189views more  JSAC 2007»
13 years 7 months ago
Non-Cooperative Power Control for Wireless Ad Hoc Networks with Repeated Games
— One of the distinctive features in a wireless ad hoc network is lack of any central controller or single point of authority, in which each node/link then makes its own decision...
Chengnian Long, Qian Zhang, Bo Li, Huilong Yang, X...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 2 months ago
Supporting the Sink Mobility: a Case Study for Wireless Sensor Networks
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...
MOBIHOC
2002
ACM
14 years 7 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
14 years 10 days ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache