Sciweavers

244 search results - page 5 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
EPEW
2005
Springer
14 years 1 months ago
Performance Tuning of Failure Detectors in Wireless Ad-hoc Networks: Modelling and Experiments
Abstract. We consider wireless ad-hoc networks and implement failure detections mechanisms. These failure detectors provide elementary information for high level distributed algori...
Corine Marchand, Jean-Marc Vincent
SIPS
2007
IEEE
14 years 1 months ago
Design and Analysis of LDPC Decoders for Software Defined Radio
Low Density Parity Check (LDPC) codes are one of the most promising error correction codes that are being adopted by many wireless standards. This paper presents a case study for ...
Sangwon Seo, Trevor N. Mudge, Yuming Zhu, Chaitali...
COMCOM
2006
178views more  COMCOM 2006»
13 years 7 months ago
SIP-based MIP6-MANET: Design and implementation of mobile IPv6 and SIP-based mobile ad hoc networks
In this paper, we designed and implemented an integrated wireless system, namely a SIP-based MIP6-MANET system. This SIP-based MIP6MANET system is an integration and implementatio...
Yuh-Shyan Chen, Yun-Hsuan Yang, Ren-Hung Hwang
PERCOM
2005
ACM
14 years 7 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
ICASSP
2010
IEEE
13 years 7 months ago
Stochastic cross-layer resource allocation for wireless networks using orthogonal access: Optimality and delay analysis
Efficient design of wireless networks requires implementation of cross-layer algorithms that exploit channel state information. Capitalizing on convex optimization and stochastic...
Antonio G. Marqués, Georgios B. Giannakis, ...