Autonomic Communication

Find loads of the autonomic communication book catalogues in this site as the choice of you visiting this page. You can also join to the website book library that will show you numerous books from any types. Literature, science, politics, and many more catalogues are presented to offer you the best book to find. The book that really makes you feels satisfied. Or that's the book that will save you from your job deadline.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[3]  Marco Tomassini,et al.  A phylogenetic, ontogenetic, and epigenetic view of bio-inspired hardware systems , 1997, IEEE Trans. Evol. Comput..

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[6]  Hui Lei,et al.  Composing pervasive data using iQL , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[7]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[8]  Serge Fdida,et al.  Some Requirements for Autonomic Routing in Self-organizing Networks , 2004, WAC.

[9]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[10]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[11]  Guanling Chen,et al.  Context aggregation and dissemination in ubiquitous computing systems , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[12]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[13]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[14]  Apratim Purakayastha,et al.  iQueue: a pervasive data composition framework , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.

[15]  Anita K. Jones,et al.  Computer System Intrusion Detection: A Survey , 2000 .

[16]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  Guanling Chen Application-Controlled Loss-Tolerant Data Dissemination , 2004 .

[18]  Robert L. Probert,et al.  Synthesis of Communication Protocols: Survey and Assessment , 1991, IEEE Trans. Computers.

[19]  Radha Poovendran,et al.  Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[20]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[21]  Dawn Xiaodong Song,et al.  A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.

[22]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[23]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[24]  William Adjie-Winoto,et al.  The design and implementation of an intentional naming system , 2000, OPSR.

[25]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[26]  Tatsuya Suda,et al.  Adaptive and Evolvable Network Services , 2004, GECCO.

[27]  Harry Chen,et al.  SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[28]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[29]  Cauligi S. Raghavendra,et al.  A programmable routing framework for autonomic sensor networks , 2003, 2003 Autonomic Computing Workshop.

[30]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[31]  Luc Steels,et al.  Emergent functionality in robotic agents through on-line evolution , 1994 .

[32]  Björn Andersson,et al.  On-Line Evolution of Control for a Four-Legged Robot Using Genetic Programming , 2000, EvoWorkshops.

[33]  Ioannis Stavrakakis,et al.  Towards Adaptable Ad Hoc Networks: The Routing Experience , 2004, WAC.

[34]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[35]  Dawn Xiaodong Song,et al.  AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.

[36]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[37]  Tassos Dimitriou,et al.  A localized, distributed protocol for secure information exchange in sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[38]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[39]  Tassos Dimitriou,et al.  Secure In-Network Processing in Sensor Networks , 2005 .

[40]  Zohar Manna,et al.  Fundamentals of Deductive Program Synthesis , 1992, IEEE Trans. Software Eng..