Sciweavers

1744 search results - page 252 / 349
» On composability of localization protocols for wireless sens...
Sort
View
SASN
2006
ACM
14 years 1 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
IPPS
2008
IEEE
14 years 2 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
JNW
2007
135views more  JNW 2007»
13 years 7 months ago
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks
Abstract— The major trend in next-generation or 4G wireless networks (NGWN/4G) is the coexistence of diverse but complementary architectures and wireless access technologies. In ...
Christian Makaya, Samuel Pierre
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Cross-layer multi-hop wireless routing for inter-vehicle communication
— Ad-hoc networking provides a cost-effective support structure for inter-vehicle communication. A decentralized peerto-peer information dissemination architecture is well suited...
Jatinder Pal Singh, Nicholas Bambos, Bhaskar Srini...