Sciweavers

5752 search results - page 219 / 1151
» Informative Labeling Schemes
Sort
View
186
Voted
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 5 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
156
Voted
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 5 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
132
Voted
NETWORKING
2004
15 years 5 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
144
Voted
TMC
2008
161views more  TMC 2008»
15 years 3 months ago
A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks
Abstract--In wireless ad hoc networks, in addition to the well-known hidden terminal and exposed terminal problems, the locationdependent contention may cause serious unfairness an...
Ping Wang, Hai Jiang, Weihua Zhuang
156
Voted
IEEECSA
2009
15 years 1 months ago
A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks
In this paper, we present a fine-grained localization algorithm for wireless sensor networks using a mobile beacon node. The algorithm is based on distance measurement using RSSI. ...
Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han