Sciweavers

1612 search results - page 304 / 323
» About models of security protocols
Sort
View
INFOCOM
2012
IEEE
11 years 11 months ago
Spectrum mobility games
Cognitive radio gives users the ability to switch channels and make use of dynamic spectral opportunities. However, switching channels takes time, and may disrupt the quality of a...
Richard Southwell, Jianwei Huang, Xin Liu
INFOCOM
2007
IEEE
14 years 2 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
14 years 2 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
ISCC
2006
IEEE
113views Communications» more  ISCC 2006»
14 years 2 months ago
Hierarchical Home Agent Architecture for Mobile IP Communications
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node us...
Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelma...
SENSYS
2006
ACM
14 years 2 months ago
Experimental study of concurrent transmission in wireless sensor networks
We undertake a systematic experimental study of the effects of concurrent packet transmissions in low-power wireless networks. Our measurements, conducted with Mica2 motes equippe...
Dongjin Son, Bhaskar Krishnamachari, John S. Heide...