Autonomic Communication
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] L. B. Milstein,et al. Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.
[3] Marco Tomassini,et al. A phylogenetic, ontogenetic, and epigenetic view of bio-inspired hardware systems , 1997, IEEE Trans. Evol. Comput..
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[6] Hui Lei,et al. Composing pervasive data using iQL , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[7] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[8] Serge Fdida,et al. Some Requirements for Autonomic Routing in Self-organizing Networks , 2004, WAC.
[9] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[10] Deborah Estrin,et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.
[11] Guanling Chen,et al. Context aggregation and dissemination in ubiquitous computing systems , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[12] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[13] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[14] Apratim Purakayastha,et al. iQueue: a pervasive data composition framework , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.
[15] Anita K. Jones,et al. Computer System Intrusion Detection: A Survey , 2000 .
[16] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Guanling Chen. Application-Controlled Loss-Tolerant Data Dissemination , 2004 .
[18] Robert L. Probert,et al. Synthesis of Communication Protocols: Survey and Assessment , 1991, IEEE Trans. Computers.
[19] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[20] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[21] Dawn Xiaodong Song,et al. A First Step Towards the Automatic Generation of Security Protocols , 2000, NDSS.
[22] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[23] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[24] William Adjie-Winoto,et al. The design and implementation of an intentional naming system , 2000, OPSR.
[25] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .
[26] Tatsuya Suda,et al. Adaptive and Evolvable Network Services , 2004, GECCO.
[27] Harry Chen,et al. SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[28] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[29] Cauligi S. Raghavendra,et al. A programmable routing framework for autonomic sensor networks , 2003, 2003 Autonomic Computing Workshop.
[30] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[31] Luc Steels,et al. Emergent functionality in robotic agents through on-line evolution , 1994 .
[32] Björn Andersson,et al. On-Line Evolution of Control for a Four-Legged Robot Using Genetic Programming , 2000, EvoWorkshops.
[33] Ioannis Stavrakakis,et al. Towards Adaptable Ad Hoc Networks: The Routing Experience , 2004, WAC.
[34] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[35] Dawn Xiaodong Song,et al. AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.
[36] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[37] Tassos Dimitriou,et al. A localized, distributed protocol for secure information exchange in sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[38] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[39] Tassos Dimitriou,et al. Secure In-Network Processing in Sensor Networks , 2005 .
[40] Zohar Manna,et al. Fundamentals of Deductive Program Synthesis , 1992, IEEE Trans. Software Eng..