Sciweavers

13007 search results - page 2469 / 2602
» Wireless and Mobile Networking
Sort
View
WONS
2012
IEEE
12 years 4 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...
NOSSDAV
2004
Springer
14 years 2 months ago
Energy-aware video streaming with QoS control for portable computing devices
We propose an energy-aware video streaming system for portable computing devices, in which the video can be played back for the specified duration within the remaining battery am...
Morihiko Tamai, Tao Sun, Keiichi Yasumoto, Naoki S...
MOBISYS
2008
ACM
14 years 8 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 2 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
WSNA
2003
ACM
14 years 2 months ago
Cleaning and querying noisy sensors
Sensor networks have become an important source of data with numerous applications in monitoring various real-life phenomena as well as industrial applications and traffic contro...
Eiman Elnahrawy, Badri Nath
« Prev « First page 2469 / 2602 Last » Next »