Sciweavers

726 search results - page 99 / 146
» Criteria for Simulation Software Evaluation
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICCCN
2007
IEEE
14 years 3 months ago
Node-Replacement Policies to Maintain Threshold-Coverage in Wireless Sensor Networks
Abstract— With the rapid deployment of wireless sensor networks, there are several new sensing applications with specific requirements. Specifically, target tracking applicatio...
Sachin Parikh, Vinod Vokkarane, Liudong Xing, Daya...
INFOCOM
2007
IEEE
14 years 3 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
HIPC
2007
Springer
14 years 3 months ago
Channel Adaptive Real-Time MAC Protocols for a Two-Level Heterogeneous Wireless Network
Abstract. Wireless technology is becoming an attractive mode of communication for real-time applications in typical settings such as in an industrial setup because of the tremendou...
Kavitha Balasubramanian, G. Sudha Anil Kumar, G. M...
ICNP
2006
IEEE
14 years 3 months ago
Differentiated BGP Update Processing for Improved Routing Convergence
— Internet routers today can be overwhelmed by a large number of BGP updates triggered by events such as session resets, link failures, and policy changes. Such excessive updates...
Wei Sun, Zhuoqing Morley Mao, Kang G. Shin