Sciweavers

278 search results - page 47 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
JCP
2006
151views more  JCP 2006»
13 years 6 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
ACSAC
1999
IEEE
13 years 11 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
TPDS
2010
145views more  TPDS 2010»
13 years 5 months ago
Efficient Broadcasting Using Network Coding and Directional Antennas in MANETs
—In this paper, we consider the issue of efficient broadcasting in mobile ad hoc networks (MANETs) using network coding and directional antennas. Network coding-based broadcastin...
Shuhui Yang, Jie Wu
CISS
2008
IEEE
14 years 1 months ago
Resource allocation algorithms for multiuser cooperative OFDMA systems with subchannel permutation
— In this paper, we investigate resource allocation for a multi-user OFDMA cooperative system. Aiming at minimizing the total transmission power under target rate constraints for...
Bo Gui, Leonard J. Cimini Jr.
CN
2004
104views more  CN 2004»
13 years 6 months ago
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access c...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....