Sciweavers

1850 search results - page 322 / 370
» On the Sensitivity of Sensor Network Simulations
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
INFOCOM
2007
IEEE
15 years 11 months ago
Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks
— Unlike terrestrial networks that mainly rely on radio waves for communications, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
WIOPT
2010
IEEE
15 years 3 months ago
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks
—Opportunistic forwarding is a simple scheme for packet routing in ad hoc wireless networks such as duty cycling sensor networks in which reducing energy consumption is a princip...
Prithwish Basu, Saikat Guha
AINA
2007
IEEE
15 years 11 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
BMCBI
2008
150views more  BMCBI 2008»
15 years 4 months ago
13C labeling experiments at metabolic nonstationary conditions: An exploratory study
Background: Stimulus Response Experiments to unravel the regulatory properties of metabolic networks are becoming more and more popular. However, their ability to determine enzyme...
Sebastian Aljoscha Wahl, Katharina Nöh, Wolfg...