Sciweavers

1307 search results - page 216 / 262
» Layered Architecture Revised
Sort
View
IPCCC
2006
IEEE
14 years 4 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
PERCOM
2006
ACM
14 years 3 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Cross-layer multi-hop wireless routing for inter-vehicle communication
— Ad-hoc networking provides a cost-effective support structure for inter-vehicle communication. A decentralized peerto-peer information dissemination architecture is well suited...
Jatinder Pal Singh, Nicholas Bambos, Bhaskar Srini...
VTC
2006
IEEE
164views Communications» more  VTC 2006»
14 years 3 months ago
Iterative Joint Channel Estimation and Symbol Detection for Multi-User MIMO OFDM
Abstract – Multiple-Input-Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems have recently attracted substantial research interest. However, compare...
Ming Jiang 0002, Jos Akhtman, Feng Guo, Lajos Hanz...
INTERSENSE
2006
ACM
14 years 3 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...