Sciweavers

1758 search results - page 195 / 352
» Energy-Efficient Communication Protocol for Wireless Microse...
Sort
View
WISEC
2009
ACM
15 years 11 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ICWN
2003
15 years 5 months ago
Eurecom IPv6 Soft Handover
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...
Farouk Belghoul, Yan Moret, Christian Bonnet
WINET
2002
101views more  WINET 2002»
15 years 4 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
ICMCS
2006
IEEE
97views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Utilizing SSR Indications for Improved Video Communication in Presence of 802.11B Residue Errors
Radio hardware used for the reception of 802.11b frames is capable of associating a Signal to Silence Ratio (SSR) with each received frame. If a received frame is corrupted, then ...
Shirish S. Karande, Utpal Parrikar, Kiran Misra, H...
SRDS
2010
IEEE
15 years 2 months ago
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks
Data aggregation scheduling, or convergecast, is a fundamental pattern of communication in wireless sensor networks (WSNs), where sensor nodes aggregate and relay data to a sink no...
Arshad Jhumka