Sciweavers

2977 search results - page 454 / 596
» Efficient Network Utilization for Multimedia Wireless Networ...
Sort
View
113
Voted
PERCOM
2008
ACM
16 years 2 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
143
Voted
PERCOM
2005
ACM
16 years 2 months ago
The Area Graph-Based Mobility Model and Its Impact on Data Dissemination
When analyzing dissemination protocols in mobile adhoc networks the underlying mobility model is an important factor because it strongly influences the performance of these protoc...
Sven Bittner, Wolf-Ulrich Raffel, Manuel Scholz
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
15 years 3 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
SUTC
2010
IEEE
15 years 1 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
WMI
2001
104views more  WMI 2001»
15 years 4 months ago
Pricing differentiated services in the GPRS environment
The General Packet Radio Service extends the existing GSM mobile communications technology by providing packet switching and higher data rates in order to efficiently access IPbas...
Sergios Soursos, Costas Courcoubetis, George C. Po...