Sciweavers

9176 search results - page 1822 / 1836
» algorithms 2010
Sort
View
SECON
2010
IEEE
13 years 8 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
SENSYS
2010
ACM
13 years 8 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
SENSYS
2010
ACM
13 years 8 months ago
PipeProbe: a mobile sensor droplet for mapping hidden pipeline
This paper presents PipeProbe, a mobile sensor system for determining the spatial topology of hidden water pipelines behind walls. PipeProbe works by dropping a tiny wireless sens...
Tsung-Te Lai, Yu-Han Chen, Polly Huang, Hao-Hua Ch...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 8 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
VTC
2010
IEEE
185views Communications» more  VTC 2010»
13 years 8 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
« Prev « First page 1822 / 1836 Last » Next »