Sciweavers

57 search results - page 8 / 12
» Towards Optimal Database Maintenance in Wireless Communicati...
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 10 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
ICDE
2003
IEEE
211views Database» more  ICDE 2003»
16 years 5 months ago
Capturing Sensor-Generated Time Series with Quality Guarantees
We are interested in capturing time series generated by small wireless electronic sensors. Battery-operated sensors must avoid heavy use of their wireless radio which is a key cau...
Iosif Lazaridis, Sharad Mehrotra
INFOCOM
2009
IEEE
15 years 11 months ago
Minimizing Delay for Multicast-Streaming in Wireless Networks with Network Coding
—Network coding is a method that promises to achieve the min-cut capacity in multicasts. However, pushing towards this gain in throughput comes with two sacrifices. Delay suffer...
Wai-Leong Yeow, Anh Tuan Hoang, Chen-Khong Tham
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 8 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna