Sciweavers

1102 search results - page 100 / 221
» Interference and Communications among Active Network Applica...
Sort
View
103
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Efficient Self Protection Algorithms for Static Wireless Sensor Networks
Wireless sensor networks have been widely used in many surveillance applications. Due to the importance of sensor nodes in such applications, certain level of protection needs to b...
Yu Wang 0003, Xiang-Yang Li, Qian Zhang
121
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Resource allocation for heterogeneous multiuser OFDM-based cognitive radio networks with imperfect spectrum sensing
—In this paper we study the resource allocation in OFDM-based cognitive radio (CR) networks, under the consideration of many practical limitations such as imperfect spectrum sens...
Shaowei Wang, Zhi-Hua Zhou, Mengyao Ge, Chonggang ...
SIGMETRICS
1998
ACM
110views Hardware» more  SIGMETRICS 1998»
15 years 4 months ago
LoGPC: Modeling Network Contention in Message-Passing Programs
In many real applications, for example those with frequent and irregular communication patterns or those using large messages, network contention and contention for message proces...
Csaba Andras Moritz, Matthew Frank
115
Voted
IPCCC
2007
IEEE
15 years 7 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
EMSOFT
2001
Springer
15 years 5 months ago
A Network-Centric Approach to Embedded Software for Tiny Devices
The ability to incorporate low-power, wireless communication into embedded devices gives rise to a new genre of embedded software that is distributed, dynamic, and adaptive. This p...
David E. Culler, Jason L. Hill, Philip Buonadonna,...