Sciweavers

MSWIM
2005
ACM
14 years 5 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
MSWIM
2005
ACM
14 years 5 months ago
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
In the last few years, the advance of multimedia applications has prompted researchers to undertake the task of routing multimedia data through Manet. This task is rather difficul...
Saida Ziane, Abdelhamid Mellouk
MSWIM
2005
ACM
14 years 5 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
MSWIM
2005
ACM
14 years 5 months ago
Latency-sensitive power control for wireless ad-hoc networks
We investigate the impact of power control on latency in wireless ad-hoc networks. If transmission power is increased, interference increases, thus reducing network capacity. A no...
Mohamed R. Fouad, Sonia Fahmy, Gopal Pandurangan
MSWIM
2005
ACM
14 years 5 months ago
Authentication protocols for ad hoc networks: taxonomy and research issues
Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweis...
MSWIM
2005
ACM
14 years 5 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
MSWIM
2005
ACM
14 years 5 months ago
Trade-offs in bit-rate allocation for wireless video streaming
One of the central problems in video transmission over lossy channels is the choice of source and channel coding rates to allocate the available transmission rate optimally. In th...
Vladimir Vukadinovic, Gunnar Karlsson
MSWIM
2005
ACM
14 years 5 months ago
Hop distances and flooding in wireless multihop networks with randomized beamforming
We show that randomized beamforming is a simple yet efficient communication strategy in wireless multihop networks if no neighbor location information is at hand. Already small an...
Robert Vilzmann, Christian Bettstetter, Daniel Med...
MSWIM
2005
ACM
14 years 5 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins
MSWIM
2005
ACM
14 years 5 months ago
Magnetic diffusion: disseminating mission-critical data for dynamic sensor networks
Envisioning a new generation of sensor network applications in healthcare and workplace safety, we seek mechanisms that provide timely and reliable transmissions of mission-critic...
Hsing-Jung Huang, Ting-Hao Chang, Shu-Yu Hu, Polly...