Sciweavers

2485 search results - page 479 / 497
» Enabling Simulation Interoperability
Sort
View
COMCOM
2007
125views more  COMCOM 2007»
14 years 9 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
90
Voted
JSAC
2008
199views more  JSAC 2008»
14 years 9 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
JSAC
2008
118views more  JSAC 2008»
14 years 9 months ago
PEEC: a channel-adaptive feedback-based error
Reliable transmission is a challenging task over wireless LANs since wireless links are known to be susceptible to errors. Although the current IEEE802.11 standard ARQ error contro...
Sohraab Soltani, Hayder Radha
JMM2
2006
111views more  JMM2 2006»
14 years 9 months ago
Employing the Hand as an Interface Device
We propose algorithms and applications for using the hand as an interface device in virtual and physical spaces. In virtual drawing, by tracking the hand in 3D and estimating a vir...
Afshin Sepehri, Yaser Yacoob, Larry S. Davis
JPDC
2006
141views more  JPDC 2006»
14 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...