Sciweavers

88 search results - page 3 / 18
» Wireless data communications using DECT air interface
Sort
View
IPPS
2007
IEEE
14 years 9 days ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ISCC
2009
IEEE
106views Communications» more  ISCC 2009»
14 years 22 days ago
Multivariate reduction in wireless sensor networks
In wireless sensor networks, energy consumption is generally associated with the amount of sent data once communication is the activity of the network that consumes more energy. T...
Orlando Silva Junior, André L. L. de Aquino...
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
13 years 12 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
SIGCOMM
2010
ACM
13 years 6 months ago
Stratus: energy-efficient mobile communication using cloud support
Cellular radio communication is a significant contributor to battery energy drain on smartphones, in some cases inflating the energy cost by a factor of 5 or more compared to the ...
Bhavish Agarwal, Pushkar Chitnis, Amit Dey, Kamal ...
INFOCOM
2002
IEEE
13 years 11 months ago
A Proxy Based Indirect Routing Scheme for Ad Hoc Wireless Networks
—The majority of the existing ad hoc wireless network routing protocols has a tendency to use the shortest single path from the source to the destination. However, in constantly ...
Wook Choi, Sajal K. Das