Sciweavers

2545 search results - page 242 / 509
» ARQ for Network Coding
Sort
View
116
Voted
PDCAT
2004
Springer
15 years 9 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
178
Voted
AOSD
2007
ACM
15 years 7 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...
112
Voted
CCR
2006
76views more  CCR 2006»
15 years 3 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
143
Voted
CN
2006
117views more  CN 2006»
15 years 3 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
120
Voted
NETWORK
2006
177views more  NETWORK 2006»
15 years 3 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang