Sciweavers

TRIDENTCOM
2008
IEEE
14 years 5 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
TRIDENTCOM
2008
IEEE
14 years 5 months ago
Optimizing AES for embedded devices and wireless sensor networks
Shammi Didla, Aaron Ault, Saurabh Bagchi
TRIDENTCOM
2008
IEEE
14 years 5 months ago
Experiences and investigations with Heraklion MESH: an experimental metropolitan multi-radio mesh network
We present our experiences and investigations with an experimental metropolitan multi-radio mesh network that covers an area of approximately 60 Km2 in the city of Heraklion, Cret...
Manolis Delakis, Kostas Mathioudakis, Nikos Petrou...
TRIDENTCOM
2008
IEEE
14 years 5 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
TRIDENTCOM
2008
IEEE
14 years 5 months ago
A flexible dual frequency testbed for RFID
This paper presents the setup of a testbed developed for the fast evaluation of RFID systems in two frequency domains. At the one hand the 13.56 MHz and at the other hand the 868 ...
Christoph Angerer, Martin Holzer 0002, Bastian Kne...
TRIDENTCOM
2008
IEEE
14 years 5 months ago
Advantages of flow bindings: an embedded mobile network use case
Antoine Boutet, Benoit Le Texier, Julien Montavont...
NOCS
2008
IEEE
14 years 5 months ago
A Network of Time-Division Multiplexed Wiring for FPGAs
Rosemary M. Francis, Simon W. Moore, Robert D. Mul...