Sciweavers

8655 search results - page 1644 / 1731
» Trusted computing challenges
Sort
View
MSWIM
2006
ACM
14 years 5 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
SASN
2006
ACM
14 years 5 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
SENSYS
2006
ACM
14 years 5 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
SENSYS
2006
ACM
14 years 5 months ago
StarDust: a flexible architecture for passive localization in wireless sensor networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, en...
Radu Stoleru, Pascal Vicaire, Tian He, John A. Sta...
VRST
2006
ACM
14 years 5 months ago
Simple user-generated motion cueing can enhance self-motion perception (Vection) in virtual reality
Despite amazing advances in the visual quality of virtual environments, affordable-yet-effective self-motion simulation still poses a major challenge. Using a standard psychophysi...
Bernhard E. Riecke
« Prev « First page 1644 / 1731 Last » Next »