Sciweavers

976 search results - page 123 / 196
» Available Bandwidth Measurement Schemes over Networks
Sort
View
139
Voted
CASES
2003
ACM
15 years 9 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
154
Voted
WISEC
2009
ACM
15 years 10 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
108
Voted
ASIAN
2005
Springer
150views Algorithms» more  ASIAN 2005»
15 years 9 months ago
ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store
Replication on geographically distributed, unreliable, P2P interconnecting nodes can offer high data availability and low network latency for replica access. The challenge is how ...
Junhu Zhang, Dongqing Yang, Shiwei Tang
132
Voted
CISS
2007
IEEE
15 years 10 months ago
Interference Mitigating in Wireless Networks Using Prior Knowledge
Abstract— We propose a framework to mitigate the interference in high data rate mobile wireless networking. Interference is a fundamental obstacle to achieve high data rates in w...
Kejing Liu, Stephan Bohacek, Javier Garcia-Frias
147
Voted
GLOBECOM
2007
IEEE
15 years 3 months ago
Cooperative Beamforming for Wireless Ad Hoc Networks
—Via collaborative beamforming, nodes in a wireless network are able to transmit a common message over long distances in an energy efficient fashion. However, the process of mak...
Lun Dong, Athina P. Petropulu, H. Vincent Poor