Sciweavers

2977 search results - page 454 / 596
» Efficient Network Utilization for Multimedia Wireless Networ...
Sort
View
PERCOM
2008
ACM
14 years 10 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
PERCOM
2005
ACM
14 years 10 months ago
The Area Graph-Based Mobility Model and Its Impact on Data Dissemination
When analyzing dissemination protocols in mobile adhoc networks the underlying mobility model is an important factor because it strongly influences the performance of these protoc...
Sven Bittner, Wolf-Ulrich Raffel, Manuel Scholz
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
13 years 11 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
SUTC
2010
IEEE
13 years 9 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
WMI
2001
104views more  WMI 2001»
14 years 5 days ago
Pricing differentiated services in the GPRS environment
The General Packet Radio Service extends the existing GSM mobile communications technology by providing packet switching and higher data rates in order to efficiently access IPbas...
Sergios Soursos, Costas Courcoubetis, George C. Po...