Sciweavers

1166 search results - page 180 / 234
» Wireless Application Protocol Transport Layer Performance
Sort
View
ICNP
2007
IEEE
15 years 9 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
155
Voted
AICCSA
2005
IEEE
164views Hardware» more  AICCSA 2005»
15 years 9 months ago
Efficient aggregation of delay-constrained data in wireless sensor networks
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef
99
Voted
MOBISYS
2009
ACM
16 years 3 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
MSWIM
2006
ACM
15 years 9 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
135
Voted
IJSSOE
2010
153views more  IJSSOE 2010»
15 years 17 days ago
SLIM: Service Location and Invocation Middleware for Mobile Wireless Sensor and Actuator Networks
One of the main obstacles to the adoption of Wireless Sensor Networks (WSNs) outside the research community is the lack of high level mechanisms to easily program them. This probl...
Gianpaolo Cugola, Alessandro Margara