Sciweavers

14424 search results - page 140 / 2885
» Modeling Radio Networks
Sort
View
118
Voted
MADNES
2005
Springer
15 years 8 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
AICT
2005
IEEE
117views Communications» more  AICT 2005»
15 years 9 months ago
Managing Pi-resources in 4G Wireless Systems: The Opportunistic Way
Integration of different radio access networks will become a reality in a near future. Our interworking architecture assumes a ubiquitous primary network (the cellular one) and se...
Pedro Sobral, Luis Bernardo, Paulo Pinto
135
Voted
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
15 years 1 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 4 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
145
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...