Sciweavers

914 search results - page 149 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ICNP
2007
IEEE
14 years 2 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
RTCSA
2005
IEEE
14 years 1 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
ICC
2007
IEEE
172views Communications» more  ICC 2007»
14 years 2 months ago
Cell Mobility Based Admission Control for Wireless Networks with Link Adaptation
— Link adaptation is one of the key technologies used in high speed wireless networks such as HSDPA and mobile WiMAX. The dynamic feature of mobile users’ channel capacities br...
Jing Li, Srinivas Sampalli
SASN
2006
ACM
14 years 1 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
IPSN
2005
Springer
14 years 1 months ago
Design considerations for solar energy harvesting wireless embedded systems
Abstract— Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energ...
Vijay Raghunathan, Aman Kansal, Jason Hsu, Jonatha...