Sciweavers

473 search results - page 61 / 95
» The Price of Validity in Dynamic Networks
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
GLOBECOM
2009
IEEE
14 years 2 months ago
MRSD: Multirate-Based Service Differentiation for the IEEE 802.15.4 Wireless Sensor Network
—The IEEE 802.15.4 standard has no provisions for rate sensitive applications because of its ability to operate in pure CSMA/CA or TDMA modes. Some operating scenarios for rate-s...
Chewoo Na, Yaling Yang
VTC
2007
IEEE
150views Communications» more  VTC 2007»
14 years 2 months ago
Analysis of Resource Reservation Aggregation in On-Board Networks
Abstract— The concept of providing mobile Internet connectivity for passengers in public transport vehicles, where users connect to a local network that attaches to the Internet v...
Muhammad Ali Malik, Lavy Libman, Salil S. Kanhere,...
IWDC
2004
Springer
161views Communications» more  IWDC 2004»
14 years 1 months ago
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
Abstract. In ad hoc networks, node mobility causes the network topology to change dynamically over time, which complicates important tasks such as routing and flow control. We pro...
Zainab R. Zaidi, Brian L. Mark
GLOBECOM
2009
IEEE
13 years 11 months ago
Measurement Based Capacity Scavenging via Whitespace Modeling in Wireless Networks
Dynamic Spectrum Access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless networ...
Anthony Plummer Jr., Mahmoud Taghizadeh, Subir Bis...