Sciweavers

2699 search results - page 412 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
MOBILWARE
2009
ACM
14 years 3 months ago
A Mission Management Framework for Unmanned Autonomous Vehicles
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. UA...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...
INFOCOM
2002
IEEE
14 years 2 months ago
Energy-Limited Wireless Networking with Directional Antennas: The Case of Session-Based Multicasting
— We consider ad hoc wireless networks that use directional antennas and have limited energy resources. The performance objectives of such networks depend largely on the applicat...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
LANC
2009
ACM
178views Education» more  LANC 2009»
14 years 1 months ago
A connection level model for IEEE 802.11 cells
We study a wireless network under the 802.11 random access protocol, supporting multiple physical layer rates. Based on models for the effective packet rates achieved at the MAC ...
Andrés Ferragut, Fernando Paganini
CONEXT
2009
ACM
13 years 10 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
SECON
2008
IEEE
14 years 3 months ago
Adaptive Radio Modes in Sensor Networks: How Deep to Sleep?
—Energy-efficient performance is a central challenge in sensor network deployments, and the radio is a major contributor to overall energy node consumption. Current energyeffic...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...