Sciweavers

3130 search results - page 554 / 626
» Collusion without communication
Sort
View
PERCOM
2008
ACM
15 years 11 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
RTSS
2008
IEEE
15 years 11 months ago
Merge-by-Wire: Algorithms and System Support
Automakers are trying to make vehicles more intelligent and safe by embedding processors which can be used to implement by-wire applications for taking smart decisions on the road...
Vipul Shingde, Gurulingesh Raravi, Ashish Gudhe, P...
134
Voted
WIMOB
2008
IEEE
15 years 11 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ACSAC
2007
IEEE
15 years 11 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
GLOBECOM
2007
IEEE
15 years 11 months ago
Degrees of Freedom of the MIMO X Channel
— We provide achievability as well as converse results for the degrees of freedom region of a MIMO X channel, i.e., a system with two transmitters, two receivers, each equipped w...
Syed Ali Jafar, Shlomo Shamai