Sciweavers

464 search results - page 57 / 93
» Detecting the number of signals in wireless DS-CDMA networks
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
On AAA with Extended IDK in Mobile IP Networks
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless tec...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 7 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
ICPADS
2007
IEEE
14 years 1 months ago
Access point selection algorithms for maximizing throughputs in wireless LAN environment
In wireless LAN technology, access point selection at each station is a critical problem in order to obtain satisfactory throughputs. The current protocol for access point selecti...
Akihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamu...
MOBICOM
2006
ACM
14 years 1 months ago
Electromagnetic communications within swarms of autonomous underwater vehicles
Autonomous underwater vehicles (AUVs) have great value as platforms for sensors. While traditional AUVs have been large platforms that tend to operate alone or in very small group...
Michael R. Frater, Michael J. Ryan, Robin M. Dunba...
JCM
2008
77views more  JCM 2008»
13 years 7 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...