Sciweavers

10044 search results - page 143 / 2009
» Authentication in Wireless Networks
Sort
View
SOCIALCOM
2010
14 years 9 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
IJWIN
2002
166views more  IJWIN 2002»
14 years 11 months ago
QoS Routing for Mesh-Based Wireless LANs
Wireless LANs with their increased data rate become an attractive technology for connecting mobile users to the Internet. Efficient deployment of wireless LANs will require the ab...
Qi Xue, Aura Ganz
INFOCOM
2003
IEEE
15 years 5 months ago
Minimum Power Broadcast Trees for Wireless Networks: Integer Programming Formulations
— Wireless multicast/broadcast sessions, unlike wired networks, inherently reaches several nodes with a single transmission. For omnidirectional wireless broadcast to a node, all...
Arindam Kumar Das
CCR
2010
203views more  CCR 2010»
14 years 11 months ago
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
We present a sophisticated framework to systematically explore the temporal correlation in environmental monitoring wireless sensor networks. The presented framework optimizes los...
Yao Liang, Wei Peng
MOBIHOC
2008
ACM
15 years 11 months ago
Exploring semantic interference in heterogeneous sensor networks
As the use of wireless sensor networks expands, there will be multiple, independent networks operating in the same physical space. These networks will run heterogeneous applicatio...
Laura Marie Feeney