Sciweavers

3938 search results - page 665 / 788
» The emergence of a networking primitive in wireless sensor n...
Sort
View
MOBISYS
2005
ACM
14 years 8 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
ICDCSW
2002
IEEE
14 years 1 months ago
Separating Introspection and Intercession to Support Metamorphic Distributed Systems
Many middleware platforms use computational reflection to support adaptive functionality. Most approaches intertwine the activity of observing behavior (introspection) with the a...
Eric P. Kasten, Philip K. McKinley, Seyed Masoud S...
ICASSP
2011
IEEE
13 years 19 days ago
Performance evaluation of Raptor and Random Linear Codes for H.264/AVC video transmission over DVB-H networks
Application Layer Forward Error Correction (AL)-FEC is increasingly being employed in the emerging wireless multimedia applications, where the multimedia data is sent along with r...
Sajid Nazir, Dejan Vukobratovic, Vladimir Stankovi...
MSN
2007
Springer
208views Sensor Networks» more  MSN 2007»
14 years 3 months ago
QoS-Aware Cooperative and Opportunistic Scheduling Exploiting Multi-user Diversity for Rate Adaptive Ad Hoc Networks
— The recent researches in wireless networks prompt the opportunistic transmission that exploiting channel fluctuations to improve the overall system performance. In wireless ad...
Zhisheng Niu
ALGOSENSORS
2009
Springer
14 years 3 months ago
Building a Communication Bridge with Mobile Hubs
We study scenarios where mobile hubs are charged with building a communication bridge between two given points s and t. We introduce a new bi-criteria optimization problem where th...
Onur Tekdas, Yokesh Kumar, Volkan Isler, Ravi Jana...