Sciweavers

COMSUR
2011
251views Hardware» more  COMSUR 2011»
12 years 11 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
COMSUR
2011
230views Hardware» more  COMSUR 2011»
12 years 11 months ago
Low-Density Parity-Check Codes and Their Rateless Relatives
—This survey guides the reader through the extensive open literature that is covering the family of low-density paritycheck (LDPC) codes and their rateless relatives. In doing so...
Nicholas Bonello, Sheng Chen 0001, Lajos Hanzo
COMSUR
2011
203views Hardware» more  COMSUR 2011»
12 years 11 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
COMSUR
2011
228views Hardware» more  COMSUR 2011»
12 years 11 months ago
Energy Harvesting Sensor Nodes: Survey and Implications
Sensor networks with battery-powered nodes can seldom simultaneously meet the design goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy-har...
Sujesha Sudevalayam, Purushottam Kulkarni
COMSUR
2011
219views Hardware» more  COMSUR 2011»
12 years 11 months ago
Link Scheduling Algorithms for Wireless Mesh Networks
Abstract—We provide an overview of link scheduling algorithms in Spatial Time Division Access (STDMA) wireless mesh networks. These algorithms can be classified into three categ...
Ashutosh Deepak Gore, Abhay Karandikar
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 11 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
COMSUR
2011
196views Hardware» more  COMSUR 2011»
12 years 11 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
COMPSYSTECH
2011
12 years 11 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos
ATVA
2011
Springer
254views Hardware» more  ATVA 2011»
12 years 11 months ago
Formal Analysis of Online Algorithms
In [AKL10], we showed how viewing online algorithms as reactive systems enables the application of ideas from formal verification to the competitive analysis of online algorithms....
Benjamin Aminof, Orna Kupferman, Robby Lampert
ATVA
2011
Springer
213views Hardware» more  ATVA 2011»
12 years 11 months ago
Max and Sum Semantics for Alternating Weighted Automata
Abstract. In the traditional Boolean setting of formal verification, alternating automata are the key to many algorithms and tools. In this setting, the correspondence between dis...
Shaull Almagor, Orna Kupferman