Sciweavers

1894 search results - page 291 / 379
» Towards Mobile Reasoning
Sort
View
WIMOB
2008
IEEE
14 years 4 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
14 years 4 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
INFOCOM
2005
IEEE
14 years 3 months ago
A disconnection-tolerant transport for drive-thru Internet environments
Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Jörg Ott, Dirk Kutscher
NSPW
2004
ACM
14 years 3 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
ATAL
2004
Springer
14 years 3 months ago
COORDINATORS: Coordination Managers for First Responders
COORDINATORs are coordination managers for fielded first responders. Each first response team is paired with a COORDINATOR coordination manager which is running on a mobile com...
Thomas Wagner, John Phelps, Valerie Guralnik, Ryan...