Sciweavers

448 search results - page 79 / 90
» k-anonymous message transmission
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...
SENSYS
2004
ACM
14 years 25 days ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
ACMSE
2007
ACM
13 years 11 months ago
Minimizing broadcast latency in ad hoc wireless networks
Network wide broadcasting in ad-hoc wireless networks provides important control and route establishment functionality for a number of unicast and multicast protocols. In broadcas...
Shankar M. Banik, Sridhar Radhakrishnan
GIS
2007
ACM
13 years 11 months ago
Randomization in traffic information sharing systems
In this paper, we consider a traffic information sharing system based on Floating Car Data (FCD). FCD is one of the methods used to gather traffic information; it uses vehicles as...
Masaaki Tanizaki, Ouri Wolfson
CN
2008
192views more  CN 2008»
13 years 7 months ago
Research on multicast routing protocols for mobile ad-hoc networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to ext...
Junhai Luo, Xue Liu, Danxia Ye