Sciweavers

326 search results - page 55 / 66
» Group Rekeying Schemes for Secure Group Communication in Wir...
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
Inter-Gateway Cross-Layer Handoffs in Wireless Mesh Networks
—Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-s...
Weiyi Zhao, Jiang Xie
ICC
2007
IEEE
14 years 2 months ago
A Low Complexity Mapping and Modulation Scheme for IEEE 802.15.4b
: We detail a code mapping scheme designed especially for devices in the enhanced wireless personal area networks operating in both the 868MHz and 915MHz bands for the emerging IEE...
Manjeet Singh, Zhongding Lei, Francois P. S. Chin,...
INFOCOM
2007
IEEE
14 years 2 months ago
Multicast Scheduling in Cellular Data Networks
— Multicast is an efficient means of transmitting the same content to multiple receivers while minimizing network resource usage. Applications that can benefit from multicast s...
Hyungsuk Won, Han Cai, Do Young Eun, Katherine Guo...
INFOCOM
2009
IEEE
14 years 2 months ago
On the Exploitation of CDF Based Wireless Scheduling
—Channel-aware scheduling strategies - such as the CDF Scheduler (CS) algorithm for the CDMA/HDR systems provide an effective mechanism for utilizing the channel data rate for im...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
ACSAC
2008
IEEE
13 years 10 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....