Sciweavers

244 search results - page 41 / 49
» On the Tightness of the Buhrman-Cleve-Wigderson Simulation
Sort
View
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 2 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
ICC
2007
IEEE
162views Communications» more  ICC 2007»
14 years 2 months ago
Application of Signal Space Diversity in BICM-ID over Cascaded Rayleigh Fading Channels
— Exploiting signal space diversity (SSD) to improve the error performance of communications systems over fading channels has been shown to be a very effective technique. The app...
Nghi H. Tran, Ha H. Nguyen, Tho Le-Ngoc
ICCCN
2007
IEEE
14 years 2 months ago
A Performance Evaluation of Vertical Handoff Scheme between Mobile-WiMax and Cellular Networks
- In multi-access network environments, interworking technologies has become a very important issue these days. This interworking would deliver optimized services to users and also...
SeongSoo Park, Jaehwang Yu, JongTae Ihm
ICMCS
2007
IEEE
112views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Peer-to-Peer Streaming with Hierarchical Network Coding
Abstract— In recent years, Content Delivery Networks (CDN) and Peerto-Peer (P2P) networks have emerged as two effective paradigms for delivering multimedia contents over the Inte...
Kien Nguyen, Thinh Nguyen, Sen-Ching S. Cheung
ICPADS
2007
IEEE
14 years 2 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera