Sciweavers

32607 search results - page 6404 / 6522
» Supporting
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
INFOCOM
2010
IEEE
13 years 8 months ago
Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks
—Nowadays, the navigation systems available on cars are becoming more and more sophisticated. They greatly improve the experience of drivers and passengers by enabling them to re...
Ilias Leontiadis, Paolo Costa, Cecilia Mascolo
INFOCOM
2010
IEEE
13 years 8 months ago
Compressive Oversampling for Robust Data Transmission in Sensor Networks
—Data loss in wireless sensing applications is inevitable and while there have been many attempts at coping with this issue, recent developments in the area of Compressive Sensin...
Zainul Charbiwala, Supriyo Chakraborty, Sadaf Zahe...
INFORMATICALT
2010
119views more  INFORMATICALT 2010»
13 years 8 months ago
Tight Arrival Curve at the Output of a Work-Conserving Blind Multiplexing Server
Abstract. As a means of supporting quality of service guarantees, aggregate multiplexing has attracted a lot of attention in the networking community, since it requires less comple...
Juan Echagüe, Vicent Cholvi
INTERACTIONS
2010
109views more  INTERACTIONS 2010»
13 years 8 months ago
The climate change habitability index
rate, the CCHI is defined abstractly as a metric that can be stated in ordinary language and diagrams that allows people to answer the following three questions related to sustaina...
Yue Pan, Chit Meng Cheong, Eli Blevis
« Prev « First page 6404 / 6522 Last » Next »