Sciweavers

5068 search results - page 907 / 1014
» Basic Computations in Wireless Networks
Sort
View
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
MOBICOM
2010
ACM
14 years 10 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...
MOBIHOC
2010
ACM
14 years 7 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
DAC
2000
ACM
15 years 11 months ago
On switch factor based analysis of coupled RC interconnects
We revisit a basic element of modern signal integrity analysis, the modeling of worst-case coupling capacitance effects within a switch factor (SF) based methodology. We show that...
Andrew B. Kahng, Sudhakar Muddu, Egino Sarto
ICNP
2006
IEEE
15 years 4 months ago
Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast
— The rising popularity of live IPTV has triggered renewed interest in P2P multicast. In particular, the simple and robust ‘swarming’ style of P2P multicast is currently favo...
Vidhyashankar Venkataraman, Kaouru Yoshida, Paul F...