ISCC
15 years 3 months ago
2006 IEEE
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
ISCC
15 years 3 months ago
2006 IEEE
Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Activ...
ISCC
2006 IEEE Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
15 years 3 months ago
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
ISCC
15 years 3 months ago
2006 IEEE
Genetic Algorithms are very powerful search methods that are used in different optimization problems. Parallel versions of genetic algorithms are easily implemented and usually in...
ISCC
15 years 3 months ago
2006 IEEE
Online monitoring of a physical phenomenon over a geographical area is a popular application of sensor networks. Networks representative of this class of applications are typicall...
|