Sciweavers

LCN
2006
IEEE
13 years 9 months ago
Cross-Level Sensor Network Simulation with COOJA
Simulators for wireless sensor networks are a valuable tool for system development. However, current simulators can only simulate a single level of a system at once. This makes sy...
Fredrik Österlind, Adam Dunkels, Joakim Eriks...
LCN
2006
IEEE
13 years 9 months ago
Car-Park Management using Wireless Sensor Networks
Jonathan P. Benson, Tony O'Donovan, Padraig O'Sull...
LCN
2006
IEEE
13 years 9 months ago
Protecting Multicast Sessions in Wireless Mesh Networks
To support reliable multicast routing in wireless mesh networks, it is important to protect multicast sessions against link or node failures. The issue of protecting multicast ses...
Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha
LCN
2006
IEEE
13 years 9 months ago
Enhanced Network-State Estimation using Change Detection
This paper presents the concept of change detection for filter-based network-state estimation. This could be useful in various contexts; two examples are network management and ad...
Erik Hartikainen, Svante Ekelin
LCN
2006
IEEE
13 years 9 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
LCN
2006
IEEE
13 years 9 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
LCN
2006
IEEE
13 years 9 months ago
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System
Structured Peer-to-Peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called Distributed Hash Tables (DHTs) ...
Simon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wr...
LCN
2006
IEEE
13 years 9 months ago
Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc Networks
We introduce a scalable algorithm for time-parallel simulations of wireless ad hoc networks and report on our results. Our approach decomposes the simulation into overlapping temp...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
LCN
2006
IEEE
13 years 9 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang
LCN
2006
IEEE
13 years 9 months ago
Optimal Multi-hop Cellular Architecture for Wireless Communications
Multi-hop relaying is an important concept in future generation wireless networks. It can address the inherent problems of limited capacity and coverage in cellular networks. Howe...
Yik Hung Tam, Hossam S. Hassanein, Selim G. Akl, R...