Sciweavers

CNSR
2008
IEEE
136views Communications» more  CNSR 2008»
14 years 6 months ago
Using QR-Updating with Reduced Complexity for Precise Localization in Mobile Sensor Networks
Localizing tiny sensor nodes in large wireless sensor networks is extremely complex, due to the node’s strict resource limitations regarding memory size, processor performance a...
Frank Reichenbach, Dominik Lieckfeldt, Dirk Timmer...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 6 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 6 months ago
An Orthogonal Projection Approach for Blind Beamforming in Multipath CDMA Channels
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
Jianshu Chen, Jian Wang, Pengyu Zhang, Jian Yuan, ...
CNSR
2008
IEEE
140views Communications» more  CNSR 2008»
14 years 6 months ago
An Approach for Optimal Bandwidth Allocation in Packet Processing Systems
The increasing demand for more bandwidth and the increased application variety fuel the need for high performance network processors. A simple but highly repetitive task performed...
Mahmood Ahmadi, Stephan Wong
CNSR
2008
IEEE
151views Communications» more  CNSR 2008»
14 years 6 months ago
Discrete Model to Estimate Lifetime of a Wireless Sensor Network for Audio Storage
— Wireless sensor networks (WSNs) can be used to record and store audio data at remote and inaccessible places. However, audio data adds an additional concern to the design of th...
Sajid Hussain, Patrick Drane, Michael Mallinson
CNSR
2008
IEEE
105views Communications» more  CNSR 2008»
14 years 6 months ago
Information Retrieval in Network Administration
Network administration is a task that requires experience in relating symptoms of network problems with possible causes and corrective actions. We describe the design of a system ...
Ashley George, Adetokunbo Makanju, A. Nur Zincir-H...
CNSR
2008
IEEE
123views Communications» more  CNSR 2008»
14 years 6 months ago
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
CNSR
2008
IEEE
14 years 6 months ago
MPA: A Network-Centric Architecture for Micro-Mobility Support in IP and MPLS Networks
Micro-mobility protocols aim to improve localized mobility by reducing the handover overheads. In this paper we present the Mobility Plane Architecture (MPA). This architecture wa...
Eduardo Zagari, Rodrigo Prado, Eleri Cardozo, Maur...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 6 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee