Sciweavers

2268 search results - page 125 / 454
» Modeling wireless shadow networks
Sort
View
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
149
Voted
TMC
2010
135views more  TMC 2010»
15 years 3 months ago
Maximizing the Lifetime of Wireless Sensor Networks with Mobile Sink in Delay-Tolerant Applications
—This paper proposes a framework to maximize the lifetime the wireless sensor network (WSN) by using a mobile sink when the underlying applications tolerate delayed information d...
YoungSang Yun, Ye Xia
118
Voted
ICCTA
2007
IEEE
15 years 11 months ago
On the Link Excess Life in Mobile Wireless Networks
In this paper, one of the most important parameters in performance evaluation and protocol design of wireless networks, Link Excess Life (LEL), is investigated. An analytical mode...
Abbas Nayebi, A. Khosravi, Hamid Sarbazi-Azad
IPPS
2008
IEEE
15 years 11 months ago
A wireless sensor network based closed-loop system for subsurface contaminant plume monitoring
A closed-loop contaminant plume monitoring system is being developed that integrates wireless sensor network based monitoring with numerical models for subsurface plumes. The syst...
Qi Han, Anura P. Jayasumana, Tissa H. Illangasekar...
175
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 11 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran