Sciweavers

COMSWARE
2008
IEEE
14 years 1 months ago
Implementation aspects of reliable transport protocols in wireless sensor networks
Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
COMSWARE
2008
IEEE
14 years 1 months ago
A large scale publish-subscribe platform for information delivery to mobile phones
—We have created a large-scale information delivery platform optimized for mobile phones and used it for many months now to run a content delivery service through SMS. We share t...
Thejovardhana Kote, S. Ramamirtham Jeyashankher, L...
COMSWARE
2008
IEEE
14 years 1 months ago
Thresholds for LDPC codes over OFDM
Aravind Iyengar, Dileep Manisseri Dileep, Andrew T...
COMSWARE
2008
IEEE
14 years 1 months ago
Simulation blocks for TOSSIM-T2
Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, J. ...
COMSWARE
2008
IEEE
14 years 1 months ago
DWT-DCT-SVD based watermarking
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
COMSWARE
2008
IEEE
14 years 1 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri
COMSWARE
2008
IEEE
14 years 1 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
COMSWARE
2008
IEEE
14 years 1 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain