Sciweavers

515 search results - page 39 / 103
» Experimentation and performance evaluation of rate adaptatio...
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
EWSN
2011
Springer
12 years 11 months ago
An Adaptive Algorithm for Compressive Approximation of Trajectory (AACAT) for Delay Tolerant Networks
Highly efficient compression provides a promising approach to address the transmission and computation challenges imposed by moving object tracking applications on resource constra...
Rajib Kumar Rana, Wen Hu, Tim Wark, Chun Tung Chou
GRAPHICSINTERFACE
2007
13 years 9 months ago
Spectral graph-theoretic approach to 3D mesh watermarking
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) t...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
VTC
2007
IEEE
129views Communications» more  VTC 2007»
14 years 1 months ago
Hybrid Model of Least Squares Handover Algorithms in Wireless Networks
Abstract— An adaptive handover algorithm for wireless comn systems is addressed in this extended abstract. Moving from the Generalized Extended Least Square handover algorithm in...
Claudia Rinaldi, Fortunato Santucci, Carlo Fischio...
INFOCOM
2006
IEEE
14 years 1 months ago
TWINE: A Hybrid Emulation Testbed for Wireless Networks and Applications
In this paper, we present a high fidelity and efficient emulation framework called TWINE, which combines the accuracy and realism of emulated and physical networks and the scala...
Junlan Zhou, Zhengrong Ji, Rajive Bagrodia