Sciweavers

1389 search results - page 201 / 278
» Model-based compression in wireless ad hoc networks
Sort
View
IWCMC
2006
ACM
15 years 4 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
ATAL
2004
Springer
15 years 3 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
INFOCOM
2010
IEEE
14 years 8 months ago
Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints
—With the convergence of multimedia applications and wireless communications, there is an urgent need for developing new scheduling algorithms to support real-time traffic with ...
Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R....
JNW
2007
87views more  JNW 2007»
14 years 10 months ago
Modeling of IEEE 802.11 DCF for Transient State Conditions
—Performance of IEEE 802.11 distributed coordination function (DCF) has been studied by several authors under steady-state conditions. Behavior of DCF under transient state condi...
Rama Krishna Challa, Saswat Chakrabarti, Debasish ...
WS
2006
ACM
15 years 4 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla