-
3
-
-
84880653464
-
Ants and Reinforcement Learning: A Case Study in Routing in Dynamic Data Networks
-
Subramanian, D. Druschel, P. Chen, J. Ants and Reinforcement Learning: A Case Study in Routing in Dynamic Data Networks. In Proceedings of IJCAI-97, 1997.
-
(1997)
Proceedings of IJCAI-97
-
-
Subramanian, D.1
Druschel, P.2
Chen, J.3
-
4
-
-
0013092449
-
A Gerographic Hash Table for Data-Centric storage in SensorNets
-
Under submission. June
-
Ratnasamy, S. Karp, B. Estrin, D. Govidan, R. and Shenker, S. A Gerographic Hash Table for Data-Centric storage in SensorNets. Under submission to the First ACM International Workshop in Wireless Sensor Networks and Applications (WSNA). June 2002.
-
(2002)
First ACM International Workshop in Wireless Sensor Networks and Applications (WSNA)
-
-
Ratnasamy, S.1
Karp, B.2
Estrin, D.3
Govidan, R.4
Shenker, S.5
-
5
-
-
0036949025
-
A Two Tier Data Dissemination Model for Large-scale Wireless Sensor Networks
-
September 23-26
-
Fan Ye, Haiyun Luo, Jerry Cheng, Songwu Lu, Lixia Zhang, "A Two Tier Data Dissemination Model for Large-scale Wireless Sensor Networks," MOBICOM'02, September 23-26, 2002
-
(2002)
MOBICOM'02
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
6
-
-
15744368857
-
Efficient and Secure Source Authentication for Multicast
-
February
-
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and Secure Source Authentication for Multicast. In Network and Distributed System Security Symposium, NDSS '01, pages 35-46, February 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
7
-
-
0033690336
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
May
-
Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In IEEE Symposium on Security and Privacy, pages 56-73, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
8
-
-
0003237987
-
The Kerberos Network Authentication Service (V5)
-
September
-
John Kohl and B. Clifford Neuman. The Kerberos Network Authentication Service (V5). RFC 1510, September 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Clifford Neuman, B.2
-
9
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
July
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), pages 189-199, July 2001.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
10
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
April
-
Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, April 1993.
-
(1993)
Technical Report CS-R9323, CWI
-
-
Brands, S.1
-
11
-
-
84862046775
-
-
http://lecs.cs.ucla.edu/~daveey/art/code.html
-
-
-
-
12
-
-
0037086890
-
Wireless sensor networks: A survey
-
December
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor networks: a survey. Computer Networks, page 393-422, December 2002
-
(2002)
Computer Networks
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
|