Sciweavers

530 search results - page 87 / 106
» Practical Threshold Signatures
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
ICC
2009
IEEE
233views Communications» more  ICC 2009»
14 years 2 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
ICC
2008
IEEE
101views Communications» more  ICC 2008»
14 years 2 months ago
Reducing Symbol Loss Probability in the Downlink of an OFDMA Based Wireless Network
—This paper studies the problem of minimizing symbol loss probability while keeping the system throughput above a certain threshold in downlink transmission of future OFDMA based...
Amin Alamdar Yazdi, Sameh Sorour, Shahrokh Valaee,...
GLOBECOM
2007
IEEE
14 years 2 months ago
Closed Loop RF Management Algorithm for Enterprise High Density WLANs
The growing adoption of 802.11 networks in the enterprise segment has led to the emergence of High Density (HD) WLAN scenarios where large (100-1000) numbers of clients are service...
Rohit Gupta, Tommy Shing, Sumit Roy, Jing Zhu
ICC
2007
IEEE
14 years 2 months ago
Trade-Offs of Spatial Gain for QoS-Guaranteed Services in the MIMO Broadcast Channels
— Although the capacity of multiple-input multiple output (MIMO) broadcast channels (BCs) can be achieved by dirty-paper coding (DPC), it is difficult to apply the results direct...
Seung Hwan Lee, John S. Thompson