Sciweavers

1066 search results - page 90 / 214
» A Wearable Communication Modulator
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 7 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
COMPSAC
2002
IEEE
14 years 1 months ago
Parallel Genetic Algorithms with Schema Migration
Genetic algorithms (GAs) are efficient non-gradient stochastic search methods. Parallel GAs are proposed to overcome the deficiencies of sequential GAs, such as low speed and aptn...
Baowen Xu, Yu Guan, Zhenqiang Chen, Karl R. P. H. ...
AUTONOMICS
2008
ACM
13 years 10 months ago
R-P2P: a data centric DTN middleware with interconnected throwboxes
In this paper we describe R-P2P, a novel system meant to support the search and retrieval of data in a given area. RP2P couples opportunistic wireless communications between mobil...
Francesco De Pellegrini, Iacopo Carreras, Daniele ...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
Contention-Based Medium Access Control with Physical Layer Assisted Link Differentiation
— In this paper, we develop contention-based medium access control (MAC) schemes for both best-effort data transmissions and delay-sensitive multimedia transmissions over WLANs. ...
Fanglei Sun, Victor O. K. Li, Zhifeng Diao, Zhengy...
TELSYS
2008
99views more  TELSYS 2008»
13 years 8 months ago
Mote-based underwater sensor networks: opportunities, challenges, and guidelines
Most underwater networks rely on expensive specialized hardware for acoustic communication and modulation. This has impeded wide scale deployments of underwater sensor networks and...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...