Sciweavers

ISCC
2009
IEEE
106views Communications» more  ISCC 2009»
14 years 6 months ago
Multivariate reduction in wireless sensor networks
In wireless sensor networks, energy consumption is generally associated with the amount of sent data once communication is the activity of the network that consumes more energy. T...
Orlando Silva Junior, André L. L. de Aquino...
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
14 years 6 months ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
ISCC
2009
IEEE
129views Communications» more  ISCC 2009»
14 years 6 months ago
Handling dynamics in gossip-based aggregation schemes
A problem in large and dynamic networks consists in making available at each node global information about the state of the network. Gossip-based aggregation schemes are a simple ...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
14 years 6 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
ISCC
2009
IEEE
139views Communications» more  ISCC 2009»
14 years 6 months ago
Location-dependent performance of cooperative networks with power allocation
—In this paper we investigate a cooperative mobile network with respect to error performance. Power allocation is applied between source and relay. The relay cooperates after hav...
Tobias Renk, Friedrich Jondral
ISCC
2009
IEEE
130views Communications» more  ISCC 2009»
14 years 6 months ago
Context-aware publish-subscribe: Model, implementation, and evaluation
Complex communication patterns often need to take into account the situation in which the information to be communicated is produced or consumed. Publish-subscribe, and particular...
Gianpaolo Cugola, Alessandro Margara, Matteo Migli...
ISCC
2009
IEEE
149views Communications» more  ISCC 2009»
14 years 6 months ago
A secure variant of the Hill Cipher
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in p...
Mohsen Toorani, Abolfazl Falahati
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 6 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ISCC
2009
IEEE
159views Communications» more  ISCC 2009»
14 years 6 months ago
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Abstract— The fluctuations of the price of crude oil is pushing the oil companies to increase the investments in seismic exploration of new oil and gas reservoir. Seismic explor...
Stefano Savazzi, Umberto Spagnolini
ISCC
2009
IEEE
129views Communications» more  ISCC 2009»
14 years 6 months ago
LWESP: Light-Weight Exterior Sensornet Protocol
Ángel Cuevas, Manuel Urueña, Annett ...