Sciweavers

209 search results - page 22 / 42
» Exploiting Information Relationships for Access Control
Sort
View
JSAC
2008
92views more  JSAC 2008»
13 years 10 months ago
Multiuser diversity with capture for wireless networks: protocol and performance analysis
Abstract--In a wireless network, with the aid of rate adaptation, multiuser diversity can be exploited by allowing the mobile user with the best channel to use the channel. However...
Justin Foo, Defeng Huang
ISCA
1996
IEEE
130views Hardware» more  ISCA 1996»
14 years 3 months ago
Informing Memory Operations: Providing Memory Performance Feedback in Modern Processors
Memory latency is an important bottleneck in system performance that cannot be adequately solved by hardware alone. Several promising software techniques have been shown to addres...
Mark Horowitz, Margaret Martonosi, Todd C. Mowry, ...
AINA
2004
IEEE
14 years 2 months ago
MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks
This paper presents a novel effective scheme of configuring Wireless Personal Area Networks (WPANs), called Master-driven Connection Control (MaCC). WPANs are based on a new wirel...
Makoto Takizawa, Hiroto Aida, Masato Saito, Yoshit...
TMC
2011
261views more  TMC 2011»
13 years 5 months ago
Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks
—An energy-efficient, reliable and timely data transmission is essential for wireless sensor networks (WSNs) employed in scenarios where plant information must be available for ...
Pan Gun Park, Carlo Fischione, Alvise Bonivento, K...
WISEC
2009
ACM
14 years 5 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz