Sciweavers

244 search results - page 32 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
PERCOM
2003
ACM
14 years 7 months ago
Self-Routing in Pervasive Computing Environments Using Smart Messages
Smart Messages (SMs) are dynamic collections of code and data that migrate to nodes of interest in the network and execute on these nodes. A key challenge in programming pervasive...
Cristian Borcea, Chalermek Intanagonwiwat, Akhiles...
VTC
2007
IEEE
125views Communications» more  VTC 2007»
14 years 1 months ago
Channel Decoder Assisted Adaptive Coding and Modulation for HAP Communications
Provision of mobile broadband wireless access, for instance via high altitude platforms (HAPs) to the passengers on a high-speed train, requires the development of efficient and r...
Miha Smolnikar, Tomaz Javornik, Mihael Mohorcic
MOBISYS
2003
ACM
14 years 7 months ago
An Entity Maintenance and Connection Service for Sensor Networks
In this paper, we present a middleware architecture for coordination services in sensor networks that facilitates interaction between groups of sensors which monitor different env...
Brian M. Blum, Prashant Nagaraddi, Anthony D. Wood...
INFOCOM
2008
IEEE
14 years 2 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...