Back to Results
First PageMeta Content
Network protocols / Wireless networking / Distributed data storage / Internet broadcasting / Multicast / Routing / Secure multicast / Network topology / Wireless ad-hoc network / Network architecture / Internet / Computing


D:Documents and SettingsLoukasDesktopvtc04hier_tree.eps
Add to Reading List

Open Document

File Size: 103,32 KB

Share Result on Facebook

City

Paris / Victoria / /

Company

Ad Hoc Networks / M G. Table I / U.S. Army Laboratory / Energy-Aware Wireless Sensor Networks / M G. With / Army Research Laboratory / Vertex / /

Country

France / China / /

/

Facility

Army Research Laboratory / University of Washington / U.S. Army Laboratory / /

IndustryTerm

key management algorithms / energy conservation / energy matrix / INTERNET DRAFT / power proximity algorithm / energy-efficient key tree / average update energy / wireless medium / tree solutions / multicast network / multicast / energy link cost / smallest energy difference / Wireless Networks / energy savings / energy / multicast communications / energy resources / wireless multicast communication / crosslayer design algorithm / energy consumption / less average update energy / average energy / energy-efficient solution / suitable routing algorithm / energy efficiency / energy-efficient key distribution / energy-efficient key distribution schemes / energy parameter / sample network / /

Organization

Army Research Office / National Science Foundation / U.S. Government / Collaborative Technology Alliance for Communication & Networks / Radha Poovendran Network Security Lab / United States Army / University of Washington / Seattle / /

Person

Radha Poovendran / W. Carman G.H. Cirincione / Javier Salido / /

Position

Group Controller / author / /

Product

VP3 / M-16 / M-9 / /

Technology

tomography / key distribution algorithm / VP3 Our algorithm / suitable routing algorithm / performing crosslayer design algorithm / Encryption / cryptography / Session encryption / power proximity algorithm / simulation / key management algorithms / /

SocialTag