Sciweavers

WINET
2010
137views more  WINET 2010»
13 years 4 months ago
The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
Youtao Zhang, Jun Yang 0002, Hai T. Vu, Yizhi Wu
WINET
2010
147views more  WINET 2010»
13 years 4 months ago
Energy-efficient protocols for wireless networks with adaptive MIMO capabilities
Transmission power control has been used in wireless networks to improve the channel reuse and/or reduce energy consumption. It has been mainly applied to single-input single-outp...
Mohammad Z. Siam, Marwan Krunz, Shuguang Cui, Alaa...
WINET
2010
178views more  WINET 2010»
13 years 4 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
WICOMM
2010
114views more  WICOMM 2010»
13 years 4 months ago
Resource allocation in OFDMA networks based on interior point methods
Mehri Mehrjoo, Somayeh Moazeni, Xuemin (Sherman) S...
WICOMM
2010
81views more  WICOMM 2010»
13 years 4 months ago
Trusted cognitive radio networking
Kwang-Cheng Chen, Peng-Yu Chen, Neeli Rashmi Prasa...
WICOMM
2010
83views more  WICOMM 2010»
13 years 4 months ago
ITRI-WiMAXT: A WiMAX conformance testing tool
Hsin-Yi Lee, Yi-Bing Lin, Ching-Feng Liang, Shiang...
WICOMM
2010
69views more  WICOMM 2010»
13 years 4 months ago
Per-user service model for opportunistic scheduling scheme over fading channels
Mehrdad Dianati, Rahim Tafazolli, Xuemin Shen, Ksh...
WIAS
2010
109views more  WIAS 2010»
13 years 4 months ago
Model identification in interactive influence diagrams using mutual information
Modeling the perceived behaviors of other agents improves the performance of an agent in multiagent interactions. We utilize the language of interactive influence diagrams to mode...
Yifeng Zeng, Prashant Doshi
TC
2010
13 years 4 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
TC
2010
13 years 4 months ago
Architectures and Execution Models for Hardware/Software Compilation and Their System-Level Realization
We propose an execution model that orchestrates the fine-grained interaction of a conventional general-purpose processor (GPP) and a high-speed reconfigurable hardware accelerator ...
Holger Lange, Andreas Koch