Sciweavers

1311 search results - page 254 / 263
» Channel and Interference Analysis for Wireless Sensor Networ...
Sort
View
SASN
2003
ACM
14 years 2 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
IJSEKE
1998
141views more  IJSEKE 1998»
13 years 8 months ago
REINAS: A Real-Time System for Managing Environmental Data
Managing scientific data is a challenging task, and many of the problems it presents have yet to be adequately solved. The Real-time Environmental Information Network and Analysi...
Eric C. Rosen, Theodore R. Haining, Darrell D. E. ...
MOBISYS
2004
ACM
14 years 8 months ago
Exponential Index: A Parameterized Distributed Indexing Scheme for Data on Air
Wireless data broadcast has received a lot of attention from industries and academia in recent years. Access efficiency and energy conservation are two critical performance concer...
Jianliang Xu, Wang-Chien Lee, Xueyan Tang
IPPS
2010
IEEE
13 years 6 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 7 months ago
An Upper Bound on Multi-hop Transmission Capacity with Dynamic Multipath Routing
This paper develops upper bounds on the end-to-end transmission capacity of multi-hop wireless networks. Potential source-destination paths are dynamically selected from a pool of...
Yuxin Chen, Jeffrey Andrews