Sciweavers

ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 3 days ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 3 days ago
Impact of Transmission Power on the Performance of UDP in Vehicular Ad Hoc Networks
—With the availability of cheap and robust wireless devices there is demand for new applications in Vehicular Ad-hoc Networks (VANET). The challenge in implementing applications ...
Behrooz Khorashadi, Andrew Chen, Dipak Ghosal, Che...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 3 days ago
On the Limitations of Random Sensor Placement for Distributed Signal Detection
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
Zhenyu Tu, Rick S. Blum
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 3 days ago
Real Time Detection of Link Failures in Inter Domain Routing
Abstract— Measurements have shown that network path failures occur frequently in the Internet and physical link failures can cause network instability in large scale and severity...
Xiaobo Long, Biplab Sikdar
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 3 days ago
Stabilizing RED using a Fuzzy Controller
—Active Queue Management (AQM) is an effective method to provide an early notification of network congestion by pro-actively dropping or marking packets. In this paper, we propo...
Jinsheng Sun, Moshe Zukerman, Marimuthu Palaniswam...
ICC
2007
IEEE
14 years 3 days ago
Using Resource Pools for Pre-Signaled Restoration LSP in ASON Networks
— When considering network restoration, the amount of reserved resources has an important impact on network performance in that it can restrict the acceptance of new connections....
Florence Kolberg, David Harle
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 3 days ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
ICC
2007
IEEE
200views Communications» more  ICC 2007»
14 years 3 days ago
Optimal Packet Scheduling for Multi-Description Multi-Path Video Streaming Over Wireless Networks
—As developments in wireless networks continue, there is an increasing expectation with regard to supporting highquality real-time video streaming service in such networks. The r...
Gui Xie, M. N. S. Swamy, M. Omair Ahmad