Sciweavers

1187 search results - page 85 / 238
» A Timed Calculus for Wireless Systems
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
WORDS
2003
IEEE
15 years 9 months ago
Towards the Delay and Synchronization Control for Networked Real-Time Multi-Object Multimedia Applications
Due to the lack of QoS support, ensuring an acceptable application level QoS for the real-time delivery of multiobject multimedia presentations on the current Internet is very cha...
Haining Liu, Magda El Zarki
COMSWARE
2007
IEEE
15 years 10 months ago
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks
—This paper deals with the topology formation schemes in the IEEE 802.11 based wireless mesh network. The recent standardization effort for specifying a wireless distribution sys...
Deepesh Man Shrestha, Young-Bae Ko
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
MDM
2009
Springer
138views Communications» more  MDM 2009»
15 years 10 months ago
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
—In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduli...
Adrian Daniel Popescu, Mohamed A. Sharaf, Cristian...