Back to Results
First PageMeta Content
Telecommunications engineering / Computing / Key distribution / Wireless mesh network / Mesh networking / Sensor node / Homomorphic encryption / ANT / Backhaul / Wireless networking / Wireless sensor network / Technology


Document Date: 2009-10-05 06:28:39


Open Document

File Size: 329,96 KB

Share Result on Facebook

City

Trento / Dublin / Istanbul / Dallas / Washington / DC / Zurich / Philadelphia / Varese / Rome / Seoul / Cambridge / Los Angeles / San Diego / /

Company

Dell / Multi-Hop Wireless Mesh Networks / Wireless Sensor Networks / AMEX / Elsevier Computer Networks / I. I NTRODUCTION Wireless Sensor Networks / /

Country

Switzerland / Italy / Turkey / United States / Korea / Ireland / /

Currency

USD / /

/

Facility

University of Insubria Dipartimento di Informatica / /

IndustryTerm

reference Wireless Mesh/Sensor Network / hybrid mesh/sensor network / example mesh routers / data aggregation protocol / extensible and effective means / distributed sensor networks / Wireless Communications / i.e. mesh routers / verification protocol / defined security solution / wireless networks / wireless mesh networks / energy / mesh router / wireless mesh networking paradigm / energy consumption / sensor networks / appropriate network / hop wireless backhaul / multimedia surveillance systems / multi-hop wireless backhaul / mesh network / data aggregation algorithm / security services / sensors networks / dynamic applications / wifi-based wireless mesh networks / latter solution / wireless mesh network / wireless mesh network testbeds / unorthodox solutions / wireless backhaul / closest mesh router / computing / mesh routers / secure aggregation protocol / access control solutions / software solutions / privacy aware solutions / localization algorithm / sensor network / Security solutions / /

OperatingSystem

BSD / /

Organization

MIT / U.S. Securities and Exchange Commission / /

/

Position

Cluster Head / /

ProgrammingLanguage

DC / /

ProvinceOrState

Manitoba / Pennsylvania / /

PublishedMedium

IEEE Wireless Communications / /

Technology

end encryption / RAM / key distribution protocol / example mesh routers / secret key / Operating system / process control / one mesh router / localization algorithm / encryption / Ethernet / telemedicine / mesh router / Public key / i.e. mesh routers / public-key encryption / 500 MHz processor / closest mesh router / verification protocol / secure aggregation protocol / data aggregation algorithm / simulation / data aggregation protocol / Flash / stream cipher / 4 mesh routers / mesh routers / /

URL

http /

SocialTag