Sciweavers

642 search results - page 70 / 129
» Detecting Spoofed Packets
Sort
View
IWCMC
2009
ACM
15 years 11 months ago
A cognitive radio system for home theatre "5+1 audio" surround applications
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
Valeria Orani, Vlad Popescu, Maurizio Murroni
GLOBECOM
2008
IEEE
15 years 11 months ago
Congestion Avoidance and Fairness in Wireless Sensor Networks
—Designing a sensor network congestion avoidance algorithm is a challenging task due to the application specific nature of these networks. The frequency of event sensing is a de...
Mohammad Z. Ahmad, Damla Turgut
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
Binary Repetition Codes and SPC Product Codes for Coded and Cooperative Diversity Systems
— A three stage network protocol that can achieve coded and cooperative diversity to improve network coverage is investigated. In Stage 1, a cyclic redundancy check code is used ...
Pavel Loskot, Norman C. Beaulieu
MOBICOM
2006
ACM
15 years 11 months ago
Increasing broadcast reliability in vehicular ad hoc networks
Broadcast transmissions are the predominate form of network traffic in a VANET. However, since there is no MAC-layer recovery on broadcast frames within an 802.11-based VANET, th...
Nathan Balon, Jinhua Guo
133
Voted
FPL
2004
Springer
117views Hardware» more  FPL 2004»
15 years 10 months ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik