Sciweavers

2699 search results - page 468 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
ASIAMS
2009
IEEE
14 years 2 months ago
A Case Study of Networks Simulation Tools for Wireless Networks
Networking community is largely depend on simulation to evaluate the behavior and performance of protocols for wireless networks, simulations are a good compromise between cost an...
Saurabh Mehta, Niamat Ullah, Humaun Kabir, Mst. Na...
GLOBECOM
2009
IEEE
14 years 2 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
SAINT
2009
IEEE
14 years 2 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
ICDCSW
2009
IEEE
14 years 2 months ago
EDLA Tradeoffs for Wireless Sensor Network Target Tracking
—The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network’s data. As node hibernation techniq...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...