Sciweavers

WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 3 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
WASA
2009
Springer
103views Algorithms» more  WASA 2009»
14 years 3 months ago
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks
Mobile underwater sensor networks are usually featured with three-dimensional topology, high node mobility and long propagation delays. For such networks, geographic routing has be...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 5 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
WASA
2009
Springer
132views Algorithms» more  WASA 2009»
14 years 5 months ago
Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks
Abstract. This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. We focus on how to u...
Peng-Jun Wan, Zhu Wang, Zhiyuan Wan, Scott C.-H. H...
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 5 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
WASA
2009
Springer
189views Algorithms» more  WASA 2009»
14 years 5 months ago
Information Extraction as Link Prediction: Using Curated Citation Networks to Improve Gene Detection
Abstract. In this paper we explore the usefulness of various types of publicationrelated metadata, such as citation networks and curated databases, for the task of identifying gene...
Andrew Arnold, William W. Cohen
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
14 years 5 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
WASA
2009
Springer
165views Algorithms» more  WASA 2009»
14 years 5 months ago
Maximum Independent Set of Links under Physical Interference Model
This paper addresses the following optimization problem in a plane multihop wireless networks under the physical interference model: From a given a set of communication links whose...
Peng-Jun Wan, Xiaohua Jia, F. Frances Yao
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 5 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
WASA
2009
Springer
92views Algorithms» more  WASA 2009»
14 years 5 months ago
Location Discovery in SpeckNets Using Relative Direction Information
A   speck   is   intended   to   be   a   miniature   (5X5X5mm)   semiconductor   device   that  combines sensing, processing, wireless communication and energy...
Ryan McNally, Damal Kandadai Arvind