Sciweavers

244 search results - page 17 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Distributed Low-Complexity Maximum-Throughput Scheduling for Wireless Backhaul Networks
— We introduce a low-complexity distributed slotted MAC protocol that can support all feasible arrival rates in a wireless backhaul network (WBN). For arbitrary wireless networks...
Abdul Kader Kabbani, Theodoros Salonidis, Edward W...
MOBIHOC
2001
ACM
14 years 7 months ago
Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices
This paper presents 7DS, a novel peer-to-peer data sharing system. 7DS is an architecture, a set of protocols and an implementation enabling the exchange of data among peers that ...
Maria Papadopouli, Henning Schulzrinne
SECON
2010
IEEE
13 years 5 months ago
Secondis: An Adaptive Dissemination Protocol for Synchronizing Wireless Sensor Networks
Reliability and predictability of the timing behavior have shown to be major issues for wireless sensor network deployments. Real-time requirements presented by several application...
Federico Ferrari, Andreas Meier, Lothar Thiele
ICDCSW
2011
IEEE
12 years 7 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
VTC
2008
IEEE
207views Communications» more  VTC 2008»
14 years 1 months ago
Practical Results of Hybrid AOA/TDOA Geo-Location Estimation in CDMA Wireless Networks
—This paper describes a hybrid AOA/TODA Mobile Station (MS) location estimation method based on the CDMA wireless communications signals. The method utilized estimates the Angle ...
Ali Broumandan, Tao Lin, John Nielsen, Géra...