-
1
-
-
0242527321
-
The Shared Wireless Infostation Model-A New Ad Hoc Networking Paradigm ( or Where there Is a Whale, there Is a Way)
-
T. Small and Z. Haas, "The Shared Wireless Infostation Model-A New Ad Hoc Networking Paradigm ( or Where there Is a Whale, there Is a Way)," Proc. ACM MobiHoc, 2003.
-
(2003)
Proc. ACM MobiHoc
-
-
Small, T.1
Haas, Z.2
-
2
-
-
0036949534
-
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet
-
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein, "Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet," Proc. Architectural Support for Progarmming Langauages and Operating Systems (ASPLOS), 2002.
-
(2002)
Proc. Architectural Support for Progarmming Langauages and Operating Systems (ASPLOS)
-
-
Juang, P.1
Oki, H.2
Wang, Y.3
Martonosi, M.4
Peh, L.5
Rubenstein, D.6
-
4
-
-
4544231245
-
Intelligent Fluid Infrastructure for Embedded Networks
-
A. Kansal, A. Somasundara, D. jea, M. Srivastava, and D. Estrin, " Intelligent Fluid Infrastructure for Embedded Networks," Proc. Second Int'l Conf. Mobile Systems, Applications, and services (MobiSys), 2004.
-
(2004)
Proc. Second Int'l Conf. Mobile Systems, Applications, and services (MobiSys)
-
-
Kansal, A.1
Somasundara, A.2
jea, D.3
Srivastava, M.4
Estrin, D.5
-
5
-
-
4444277059
-
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks
-
W. Zhao, M. Ammar, and E. Zegura, "A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks," Proc. ACM MobiHoc, 2004.
-
(2004)
Proc. ACM MobiHoc
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
7
-
-
33646575292
-
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
-
S. Jain, R.C. Shah, W. Brunette, G. Borriello and S. Roy, "Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks", Mobile Networks and Applications, 2006.
-
(2006)
Mobile Networks and Applications
-
-
Jain, S.1
Shah, R.C.2
Brunette, W.3
Borriello, G.4
Roy, S.5
-
8
-
-
33746336249
-
Controllably Mobile Infrastructure for Low Energy Embedded Networks
-
August
-
A. Somasundara, A. Kansal, D. Jea, D. Estrin, and M. Srivastava, "Controllably Mobile Infrastructure for Low Energy Embedded Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, August 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.8
-
-
Somasundara, A.1
Kansal, A.2
Jea, D.3
Estrin, D.4
Srivastava, M.5
-
10
-
-
33750316239
-
Communciation Power Optimization in a Sensor network with a Path-Constrained Mobile Observer
-
August
-
A. Chakrabarti, A. Sabharwal, and B. Aazhang, "Communciation Power Optimization in a Sensor network with a Path-Constrained Mobile Observer," ACM Transactions on Sensor Networks, vol. 2, no. 3, pp.297-324, August 2006
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.3
, pp. 297-324
-
-
Chakrabarti, A.1
Sabharwal, A.2
Aazhang, B.3
-
12
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of ACM, vol. 33, no. 4, pp. 210-217, 1986.
-
(1986)
Journal of ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0019634370
-
Password Authentication with Insecure Commuincation
-
November
-
L. Lamport, "Password Authentication with Insecure Commuincation," Communications of the ACM, vol, 24, no. 11, pp. 770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. WMCSA, 2002.
-
(2002)
Proc. WMCSA
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
15
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. Tygar, "SPINS: Security Protocols for Sensor Networks," Proc. MobiCom, 2001.
-
(2001)
Proc. MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
17
-
-
0041973497
-
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
Y. Hu, A. Perrig, and Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. InfoCom, 2003.
-
(2003)
Proc. InfoCom
-
-
Hu, Y.1
Perrig, A.2
Johnson3
-
24
-
-
3543056512
-
An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IEEE Symposium on Security and Privacy, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
25
-
-
3543100577
-
Statistical Enroute Filtering of Injected False Data in Sensor Networks
-
F. Ye, H. Luo, S. Lu, and Zhang, "Statistical Enroute Filtering of Injected False Data in Sensor Networks," IEEE InfoCom, 2004.
-
(2004)
IEEE InfoCom
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang4
|