Sciweavers

19 search results - page 3 / 4
» telsys 2010
Sort
View
TELSYS
2010
86views more  TELSYS 2010»
13 years 10 days ago
Cross-layer TCP with bitmap error recovery scheme in wireless ad hoc networks
Rung-Shiang Cheng, Der-Jiunn Deng, Yueh-Min Huang,...
TELSYS
2010
121views more  TELSYS 2010»
13 years 10 days ago
Packet level performance analysis of a packet scheduler exploiting multiuser diversity
In this paper, we consider a packet scheduler exploiting multiuser diversity in a wireless network with AMC (Adaptive Modulation and Coding), and propose a packet level performance...
Gang Uk Hwang, Fumio Ishizaki
TELSYS
2010
132views more  TELSYS 2010»
13 years 10 days ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
TELSYS
2010
174views more  TELSYS 2010»
13 years 10 days ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
TELSYS
2010
94views more  TELSYS 2010»
13 years 4 months ago
An improved Hurst parameter estimator based on fractional Fourier transform
A fractional Fourier transform (FrFT) based estimation method is introduced in this paper to analyze the long range dependence (LRD) in time series. The degree of LRD can be chara...
Yangquan Chen, Rongtao Sun, Anhong Zhou