Sciweavers

IPCCC
2007
IEEE
14 years 3 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
IPCCC
2007
IEEE
14 years 3 months ago
Composite Event Detection in Wireless Sensor Networks
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming c...
Chinh T. Vu, Raheem A. Beyah, Yingshu Li
IPCCC
2007
IEEE
14 years 3 months ago
Scheduling of Periodic Packets in Energy-Aware Wireless Networks
Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets...
Xiao Qin, Mohammed I. Alghamdi, Mais Nijim, Zilian...
IPCCC
2007
IEEE
14 years 3 months ago
Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study
As Chip Multiprocessor (CMP) has become the mainstream in processor architectures, Intel and AMD have introduced their dual-core processors to the PC market. In this paper, perfor...
Lu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-K...
IPCCC
2007
IEEE
14 years 3 months ago
TCP Vegas Performance with Streaming Media
In this paper we study the use of TCP Vegas as a transport protocol for streaming media. We also consider TCP NewReno as a transport protocol for streaming media. We find that: 1...
Sean D. Boyden, Anirban Mahanti, Carey L. Williams...
IPCCC
2007
IEEE
14 years 3 months ago
Compiler-Directed Functional Unit Shutdown for Microarchitecture Power Optimization
Leakage power is a major concern in current microarchitectures as it is increasing exponentially with decreasing transistor feature sizes. In this paper, we present a technique ca...
Santosh Talli, Ram Srinivasan, Jeanine Cook
IPCCC
2007
IEEE
14 years 3 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
IPCCC
2007
IEEE
14 years 3 months ago
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
A. Bai, Tor Skeie, Paal E. Engelstad
IPCCC
2007
IEEE
14 years 3 months ago
IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor Networks
For economic reasons sensor networks are often implemented with resource constrained micro-controllers and low-end radio transceivers. Consequently, communication is inherently un...
Marcin Brzozowski, Reinhardt Karnapke, Jörg N...
IPCCC
2007
IEEE
14 years 3 months ago
A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem Support
To offset the significant power demands of hard disk drives in computer systems, drives are typically powered down during idle periods. This saves power, but accelerates duty cyc...
Timothy Bisson, Scott A. Brandt, Darrell D. E. Lon...