Sciweavers

57 search results - page 8 / 12
» Towards Optimal Database Maintenance in Wireless Communicati...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 1 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
ICDE
2003
IEEE
211views Database» more  ICDE 2003»
14 years 9 months ago
Capturing Sensor-Generated Time Series with Quality Guarantees
We are interested in capturing time series generated by small wireless electronic sensors. Battery-operated sensors must avoid heavy use of their wireless radio which is a key cau...
Iosif Lazaridis, Sharad Mehrotra
INFOCOM
2009
IEEE
14 years 2 months ago
Minimizing Delay for Multicast-Streaming in Wireless Networks with Network Coding
—Network coding is a method that promises to achieve the min-cut capacity in multicasts. However, pushing towards this gain in throughput comes with two sacrifices. Delay suffer...
Wai-Leong Yeow, Anh Tuan Hoang, Chen-Khong Tham
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna