Sciweavers

52 search results - page 5 / 11
» jsac 2010
Sort
View
JSAC
2010
86views more  JSAC 2010»
13 years 8 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
JSAC
2010
142views more  JSAC 2010»
13 years 8 months ago
Cross-layer optimization for streaming scalable video over fading wireless networks
—We present a cross-layer design of transmitting scalable video streams from a base station to multiple clients over a shared fading wireless network by jointly considering the a...
Honghai Zhang, Yanyan Zheng, Mohammad A. Khojastep...
JSAC
2010
104views more  JSAC 2010»
13 years 8 months ago
A priority-based processor sharing model for TDM passive optical networks
—The use of passive optical networks (PONs) enables access rates of multi-Gbit/sec bandwidth and provision of quality of service for high definition multimedia services. In this...
Yan Wang, Moshe Zukerman, Ron Addie, Sammy Chan, R...
JSAC
2010
113views more  JSAC 2010»
13 years 8 months ago
On counteracting Byzantine attacks in network coded peer-to-peer networks
Abstract—Random linear network coding can be used in peerto-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are ...
MinJi Kim, Luísa Lima, Fang Zhao, Joã...
JSAC
2010
147views more  JSAC 2010»
13 years 8 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...