Sciweavers

244 search results - page 22 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 15 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
PEWASUN
2008
ACM
13 years 9 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 1 months ago
BER Analysis of 802.11b Networks Under Mobility
—Most of the current 802.11b research activities are conducted under stationary environment. As the need for highspeed connectivity in mobile environments increases, it becomes n...
Puttipong Mahasukhon, Michael Hempel, Hamid Sharif...
ICDCS
2003
IEEE
14 years 27 days ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 7 months ago
Distributed Beamforming with Feedback: Convergence Analysis
The focus of this work is on the analysis of transmit beamforming schemes with a low-rate feedback link in wireless sensor/relay networks, where nodes in the network need to imple...
Che Lin, Venugopal V. Veeravalli, Sean P. Meyn