Sciweavers

1894 search results - page 291 / 379
» Towards Mobile Reasoning
Sort
View
161
Voted
WIMOB
2008
IEEE
15 years 9 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
124
Voted
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
15 years 9 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
137
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A disconnection-tolerant transport for drive-thru Internet environments
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Jörg Ott, Dirk Kutscher
125
Voted
NSPW
2004
ACM
15 years 8 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
110
Voted
ATAL
2004
Springer
15 years 8 months ago
COORDINATORS: Coordination Managers for First Responders
COORDINATORs are coordination managers for fielded first responders. Each first response team is paired with a COORDINATOR coordination manager which is running on a mobile com...
Thomas Wagner, John Phelps, Valerie Guralnik, Ryan...