Sciweavers

231 search results - page 34 / 47
» Data naming in Vehicle-to-Vehicle communications
Sort
View
DSN
2008
IEEE
14 years 2 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
GLOBECOM
2007
IEEE
14 years 2 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
GLOBECOM
2006
IEEE
14 years 1 months ago
Differentiated Multiclass QoS in Wireless Multicarrier Environments
Abstract— Differentiated QoS provision in wireless environments via multicarrier energy allocation is examined in this work. Within this framework, differentiated QoS is applied ...
Michael A. Enright, C. C. Jay Kuo
IWCMC
2006
ACM
14 years 1 months ago
Performance of Taroko: a cluster-based addressing and routing scheme for self-organized networks
Self-Organized Networks (SONs) are a general description of autonomous networks without infrastructure, of which Ad Hoc, Sensor and Mesh networks are special cases. We had previou...
Julien Ridoux, Meriem Kassar, Mathias Boc, Anne Fl...
PET
2005
Springer
14 years 1 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey