Sciweavers

436 search results - page 71 / 88
» Transmitting Video-on-Demand Effectively
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
EUC
2006
Springer
14 years 1 months ago
SAQA: Spatial and Attribute Based Query Aggregation in Wireless Sensor Networks
In most wireless sensor networks, applications submit their requests as queries and wireless sensor network transmits the requested data to the applications. However, most existing...
Jie Yang, Bo Yan, Sungyoung Lee, Jinsung Cho
ASPDAC
2001
ACM
68views Hardware» more  ASPDAC 2001»
14 years 1 months ago
Reducing bus delay in submicron technology using coding
ct,. In this paper we study the delay associated with transmission of data through busses. Previous work in this area has presented models for delay assuming a distributed wire mqd...
Paul-Peter Sotiriadis, Anantha Chandrakasan
CEC
2005
IEEE
14 years 1 days ago
Nonlinear mapping using particle swarm optimisation
Abstract— Nonlinear mapping is an approach of multidimensional scaling where a high-dimensional space is transformed into a lower-dimensional space such that the topological char...
Auralia I. Edwards, Andries Petrus Engelbrecht, Ne...
CISS
2007
IEEE
13 years 12 months ago
Echo-Cancellation for Ultrasonic Data Transmission through a Metal Channel
– The process control industry has shown great interest in implementation of low cost, low power wireless sensor networks. Such networks are much easier to deploy and reconfigure...
Richard Primerano, Kevin Wanuga, Joseph Dorn, Mosh...