Sciweavers

1660 search results - page 321 / 332
» Forwarding in a content-based network
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 8 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
IJSN
2007
129views more  IJSN 2007»
13 years 8 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
JNCA
2007
106views more  JNCA 2007»
13 years 8 months ago
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system
Bluetooth is a new technology for low-cost, low-power, and short-range wireless communication. By constructing a piconet, Bluetooth device establishes link and communicates with o...
Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih...
JSAC
2007
153views more  JSAC 2007»
13 years 8 months ago
Cooperative Relay Service in a Wireless LAN
As a family of wireless local area network (WLAN) protocols between physical layer and higher layer protocols, IEEE 802.11 has to accommodate the features and requirements of both...
Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Song...
TWC
2008
151views more  TWC 2008»
13 years 8 months ago
Energy-Efficient Cooperative Relaying over Fading Channels with Simple Relay Selection
We consider a cooperative wireless network where the source broadcasts data to relays, some or all of which cooperatively beamform to forward the data to the destination. The netw...
Ritesh Madan, Neelesh B. Mehta, Andreas F. Molisch...