Sciweavers

244 search results - page 16 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
TWC
2010
13 years 2 months ago
Beamforming in MISO Systems: Empirical Results and EVM-Based Analysis
We present an analytical, simulation, and experimental-based study of beamforming Multiple Input Single Output (MISO) systems. We analyze the performance of beamforming MISO syste...
Melissa Duarte, Ashutosh Sabharwal, Chris Dick, Ra...
CEE
2006
94views more  CEE 2006»
13 years 7 months ago
Study and performance analysis of transport layer mechanisms applied in military radio environment
The need for reliable data communication performed in critical conditions and the respect of real-time constraints is an open issue in radio-military networks, where fixed and nom...
Tomaso de Cola, Mario Marchese
IWCMC
2006
ACM
14 years 1 months ago
The hybrid mobile wireless sensor networks for data gathering
Introducing heterogeneous mobile devices, such as mobile phones into the large scale sparse wireless sensor networks is a promising research direction. These devices acting as mob...
Biao Ren, Jian Ma, Canfeng Chen
DSN
2004
IEEE
13 years 11 months ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders
ITIIS
2008
128views more  ITIIS 2008»
13 years 7 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...