Sciweavers

2162 search results - page 300 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
TWC
2008
138views more  TWC 2008»
14 years 10 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
TWC
2008
156views more  TWC 2008»
14 years 10 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
TWC
2008
156views more  TWC 2008»
14 years 10 months ago
Dynamic Bandwidth Allocation for QoS Provisioning in IEEE 802.16 Networks with ARQ-SA
In this paper, bandwidth allocation, in terms of distributing available data slots among different users, is studied for QoS provisioning in IEEE 802.16 networks. By considering th...
Weiwei Wang, Zihua Guo, Xuemin Shen, Changjia Chen...
TWC
2008
119views more  TWC 2008»
14 years 10 months ago
Flow-level performance of opportunistic OFDM-TDMA and OFDMA networks
Abstract--In this paper, the flow-level performance of opportunistic scheduling in orthogonal frequency division multiplexing (OFDM) networks is studied. The analysis accounts for ...
Lei Lei, Chuang Lin, Jun Cai, Xuemin Shen
CANDC
2002
ACM
14 years 9 months ago
Interactive processes between mental and external operations in creative activity: a comparison of experts' and novices' perform
Prior studies of creativity, in the field of cognitive psychology, have mainly dealt with only the process of mentally thinking of ideas. We investigated, through a cognitive psyc...
Norio Ishii, Kazuhisa Miwa