Sciweavers

459 search results - page 65 / 92
» Detecting Spam at the Network Level
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
DEXAW
2004
IEEE
90views Database» more  DEXAW 2004»
13 years 11 months ago
Opportunistic Dissemination of Spatio-Temporal Resource Information in Mobile Peer to Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Ouri Wolfson, Bo Xu
INFOCOM
2007
IEEE
14 years 2 months ago
Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards
— It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as wel...
Giuseppe Bianchi, Antonio Di Stefano, Costantino G...
BSN
2006
IEEE
157views Sensor Networks» more  BSN 2006»
14 years 1 months ago
HealthGear: A Real-time Wearable System for Monitoring and Analyzing Physiological Signals
We present HealthGear, a real-time wearable system for monitoring, visualizing and analyzing physiological signals. HealthGear consists of a set of non-invasive physiological sens...
Nuria Oliver, Fernando Flores-Mangas
DSN
2004
IEEE
13 years 11 months ago
Tolerating Hard Faults in Microprocessor Array Structures
In this paper, we present a hardware technique, called Self-Repairing Array Structures (SRAS), for masking hard faults in microprocessor array structures, such as the reorder buff...
Fred A. Bower, Paul G. Shealy, Sule Ozev, Daniel J...