Sciweavers

560 search results - page 82 / 112
» Constant-Complexity Models for Wireless Channels
Sort
View
GLOBECOM
2008
IEEE
14 years 2 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
WCNC
2008
IEEE
14 years 2 months ago
A Novel Capacity Analysis for Wireless Backhaul Mesh Networks
—This paper presents a novel ring-based approach to analyze the inter-flow capacity of a backhaul wireless mesh networks (WMNs) with centralized scheduling. Based on the property...
Tein-Yaw D. Chung, Kuan-Chun Lee, Hsiao-Chih Georg...
IPPS
2006
IEEE
14 years 2 months ago
Real-time task mapping and scheduling for collaborative in-network processing in DVS-enabled wireless sensor networks
With the increasing importance of energy consumption considerations and new requirements of emerging applications, in-network processing of information gains recognition as a viab...
Yuan Tian, J. Boangoat, Eylem Ekici, Füsun &O...
IPSN
2004
Springer
14 years 1 months ago
An energy-aware data-centric generic utility based approach in wireless sensor networks
Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and energyconstrained in nature. In this paper, formulate t...
Wei-Peng Chen, Lui Sha
COMCOM
2007
139views more  COMCOM 2007»
13 years 8 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin