Sciweavers

COMSWARE
2007
IEEE
13 years 10 months ago
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks
—Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. Neighboring devices elect one appropriate device as clusterhead. Due t...
Matthias R. Brust, Adrian Andronache, Steffen Roth...
COMSWARE
2007
IEEE
13 years 10 months ago
Scalable Multicast Platforms for a New Generation of Robust Distributed Applications
1 As distributed systems scale up and are deployed into increasingly sensitive settings, demand is rising for a new generation of communications middleware in support of applicati...
Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudo...
COMSWARE
2007
IEEE
13 years 10 months ago
Analysis of Dynamic Sensor Networks: Power Law Then What?
— Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these...
Eric Fleury, Jean-Loup Guillaume, Céline Ro...
COMSWARE
2007
IEEE
13 years 10 months ago
Sequence Design for Symbol-Asynchronous CDMA with Power or Rate Constraints
— Sequence design and resource allocation for a symbol-asynchronous chip-synchronous code division multiple access (CDMA) system is considered in this paper. A simple lower bound...
Jyothiram Kasturi, Rajesh Sundaresan
COMSWARE
2007
IEEE
13 years 10 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
COMSWARE
2007
IEEE
13 years 10 months ago
The Transport Layer Revisited
— End-to-end transport protocols such as TCP perform poorly in mobile environments, primarily due to their inability to cope with the dynamics incurred by node mobility. We re-co...
Simon Heimlicher, Rainer Baumann, Martin May, Bern...
COMSWARE
2007
IEEE
13 years 10 months ago
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks
— We present a novel distributed range-free technique called ExPLoIT for estimating geographical location of sensor nodes in mobile sensor networks. ExPLoIT is the rst positioning...
Christophe Baraer, Kaustubh S. Phanse, Johan Nykvi...
COMSWARE
2007
IEEE
13 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
COMSWARE
2007
IEEE
13 years 10 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
COMSWARE
2007
IEEE
13 years 10 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri