Sciweavers

COMSWARE
2008
IEEE
13 years 10 months ago
Implementation aspects of reliable transport protocols in wireless sensor networks
Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
COMSWARE
2008
IEEE
13 years 10 months ago
A large scale publish-subscribe platform for information delivery to mobile phones
—We have created a large-scale information delivery platform optimized for mobile phones and used it for many months now to run a content delivery service through SMS. We share t...
Thejovardhana Kote, S. Ramamirtham Jeyashankher, L...
COMSWARE
2008
IEEE
13 years 10 months ago
Thresholds for LDPC codes over OFDM
Aravind Iyengar, Dileep Manisseri Dileep, Andrew T...
COMSWARE
2008
IEEE
13 years 10 months ago
Simulation blocks for TOSSIM-T2
Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, J. ...
COMSWARE
2008
IEEE
13 years 10 months ago
DWT-DCT-SVD based watermarking
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
COMSWARE
2008
IEEE
13 years 10 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri
COMSWARE
2008
IEEE
13 years 10 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
COMSWARE
2008
IEEE
13 years 10 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain