Sciweavers

1166 search results - page 180 / 234
» Wireless Application Protocol Transport Layer Performance
Sort
View
ICNP
2007
IEEE
14 years 3 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
AICCSA
2005
IEEE
164views Hardware» more  AICCSA 2005»
14 years 2 months ago
Efficient aggregation of delay-constrained data in wireless sensor networks
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef
MOBISYS
2009
ACM
14 years 9 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
MSWIM
2006
ACM
14 years 2 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
IJSSOE
2010
153views more  IJSSOE 2010»
13 years 6 months ago
SLIM: Service Location and Invocation Middleware for Mobile Wireless Sensor and Actuator Networks
One of the main obstacles to the adoption of Wireless Sensor Networks (WSNs) outside the research community is the lack of high level mechanisms to easily program them. This probl...
Gianpaolo Cugola, Alessandro Margara