Sciweavers

2822 search results - page 440 / 565
» Mining Optimized Ranges
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
CEC
2008
IEEE
14 years 2 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
GLOBECOM
2008
IEEE
14 years 2 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
ICC
2008
IEEE
115views Communications» more  ICC 2008»
14 years 2 months ago
Connectivity Model for Wireless Mesh Networks
—This paper presents a novel methodology for finding the network connectivity in wireless mesh networks while taking into account dependencies existing between links of geometri...
Mohamed Abou El Saoud, Hussein Al-Zubaidy, Samy Ma...
ICPR
2008
IEEE
14 years 2 months ago
A similarity measure under Log-Euclidean metric for stereo matching
Stereo matching has been one of the most active areas in computer vision for decades. Many methods, ranging from similarity measures to local or global matching cost optimization ...
Quanquan Gu, Jie Zhou