Sciweavers

MOBILIGHT
2010
12 years 11 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
MOBILIGHT
2010
13 years 2 months ago
Trust Management in Monitoring Financial Critical Information Infrastructures
Giorgia Lodi, Roberto Baldoni, Hisain Elshaafi, Ba...
MOBILIGHT
2010
13 years 2 months ago
A Framework for the Design Space Exploration of Software-Defined Radio Applications
Abstract. This paper describes a framework for the design space exploration of resource-efficient software-defined radio architectures. This design space exploration is based on a ...
Thorsten Jungeblut, Ralf Dreesen, Mario Porrmann, ...
MOBILIGHT
2010
13 years 2 months ago
Robust Wireless Network Coding - An Overview
Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswe...
Marco Di Renzo, Lana Iwaza, Michel Kieffer, Pierre...
MOBILIGHT
2010
13 years 2 months ago
CogProt: A Framework for Cognitive Configuration and Optimization of Communication Protocols
Advancements in network technologies dramatically increased management complexity. Cognitive networking was introduced to deal with this problem, by providing algorithms for autono...
Dzmitry Kliazovich, Neumar Malheiros, Nelson L. S....
MOBILIGHT
2010
13 years 2 months ago
Virtual Distributed Simulation Platform for the Study and Optimization of Future Beyond 3G Heterogeneous Systems
This paper proposes and assesses a new distributed simulation platform for heterogeneous wireless communications. The objective of the ICARUS platform is to investigate cross-layer...
M. Carmen Lucas-Estan, Salva Garrigas, Javier Goz&...
MOBILIGHT
2010
13 years 2 months ago
TOA Estimation in UWB: Comparison between Time and Frequency Domain Processing
Abstract. A comparison between time and frequency domain TOA estimators compliant with the 802.15.4a Standard has been made. The time domain estimator is done in two stages. One ha...
Eva Lagunas, Lorenzo Taponecco, Montse Nája...
MOBILIGHT
2010
13 years 2 months ago
Measuring the Closed-Loop Throughput of 2x2 HSDPA over TX Power and TX Antenna Spacing
Abstract. Mobile network operators demand small base station antennas and high physical layer throughputs. In the downlink, high physical layer throughputs can be achieved by explo...
Sebastian Caban, José Antonio García...
MOBILIGHT
2010
13 years 2 months ago
Wide-Weak Privacy-Preserving RFID Authentication Protocols
Yong Ki Lee, Lejla Batina, Dave Singelée, I...