Sciweavers

215 search results - page 35 / 43
» A Mobile Ambients-Based Approach for Network Attack Modellin...
Sort
View
MEDIAFORENSICS
2010
13 years 9 months ago
Audio annotation watermarking with robustness against DA/AD conversion
In the paper we present a watermarking scheme developed to meet the specific requirements of audio annotation watermarking robust against DA/AD conversion (watermark detection aft...
Kun Qian, Christian Krätzer, Michael Biermann...
ADHOC
2010
195views more  ADHOC 2010»
13 years 8 months ago
SDRT: A reliable data transport protocol for underwater sensor networks
In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor net...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
TON
2008
136views more  TON 2008»
13 years 7 months ago
Density-based anycast: a robust routing strategy for wireless ad hoc networks
Abstract--Existing anycast routing protocols solely route packets to the closest group member. In this paper, we introduce density-based anycast routing, a new anycast routing para...
Vincent Lenders, Martin May, Bernhard Plattner
ICSNC
2007
IEEE
14 years 2 months ago
Movement Prediction Using Bayesian Learning for Neural Networks
Nowadays, path prediction is being extensively examined for use in the context of mobile and wireless computing towards more efficient network resource management schemes. Path pr...
Sherif Akoush, Ahmed Sameh
ICNS
2008
IEEE
14 years 2 months ago
Performance Study of PANA Pre-authentication for Interdomain Handover
—To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuo...
Patryk Chamuczynski, Omar Alfandi, Constantin Wern...