Sciweavers

5901 search results - page 1026 / 1181
» Algorithms for Wireless Sensor Networks
Sort
View
100
Voted
IWCMC
2006
ACM
15 years 4 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
AHSWN
2010
130views more  AHSWN 2010»
14 years 10 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li
69
Voted
MUE
2008
IEEE
84views Multimedia» more  MUE 2008»
15 years 4 months ago
TCP-Based Dynamic Media Stream Adaptation in Ubiquitous Environment
More and more media material is consumed in ubiquitous environment where the service can be experienced over different devices, network conditions, network bearers, etc. Unlike in...
Gergely Hományi, Gábor Paller
VTC
2006
IEEE
113views Communications» more  VTC 2006»
15 years 4 months ago
Implementation of a Multihoming Agent for Mobile On-board Communication
— A research topic that is becoming increasingly popular is that of on-board mobile communication, where users on a vehicle are connected to a local network that attaches to the ...
Jun Yao, Yi Duan, Jianyu Pan, Kun-Chan Lan
WMASH
2003
ACM
15 years 3 months ago
An end-to-end multi-path smooth handoff scheme for stream media
In the near future, wide variety of wireless networks will be merged into the Internet and allow users to continue their application with higher degree of mobility. In such enviro...
Yi Pan, Meejeong Lee, Jaime Bae Kim, Tatsuya Suda
« Prev « First page 1026 / 1181 Last » Next »