Sciweavers

1677 search results - page 275 / 336
» Traffic Models for Wireless Communication Networks
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
MOBIHOC
2004
ACM
14 years 8 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
WIOPT
2010
IEEE
13 years 7 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
MOBIHOC
2006
ACM
14 years 8 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
INFOCOM
2007
IEEE
14 years 3 months ago
End-to-End Routing for Dual-Radio Sensor Networks
— Dual-radio, dual-processor nodes are an emerging class of Wireless Sensor Network devices that provide both lowenergy operation as well as substantially increased computational...
Thanos Stathopoulos, Martin Lukac, Dustin McIntire...