Sciweavers

642 search results - page 33 / 129
» Detecting Spoofed Packets
Sort
View
TSP
2010
14 years 8 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
ICWN
2008
15 years 3 months ago
Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Landslides are one of the environmental disasters that cause massive destruction of human life and infrastructure. Real time monitoring of a landslide prone areas are necessary to...
Ramesh Maneesha, P. Ushakumari
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 8 months ago
Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks
Abstract—Impulse Radio Ultra-wideband (IR-UWB) communication has proven an important technique for supporting highrate, short-range, low-power communication. These are necessary ...
Tianqi Wang, Wendi B. Heinzelman, Alireza Seyedi
ICCSA
2004
Springer
15 years 7 months ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
SENSYS
2005
ACM
15 years 7 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...