Sciweavers

678 search results - page 82 / 136
» Myopic Coding in Wireless Networks
Sort
View
ICDCS
2008
IEEE
15 years 7 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
92
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 6 months ago
Performance Analysis of Adaptive Rate Scheduling Scheme for 3G WCDMA Wireless Networks with Multi-Operators
— Sharing of 3G network infrastructure among operators offers an alternative solution to reducing the investment in the coverage phase of WCDMA. For radio access network (RAN) sh...
Salman AlQahtani, Ashraf S. Mahmoud, Asrar U. Shei...
117
Voted
IDMS
1998
Springer
141views Multimedia» more  IDMS 1998»
15 years 4 months ago
An Image Coding and Reconstruction Scheme for Mobile Computing
An asynchronous transfer mode (ATM) wireless network has bursty and high error rates. To combat the contiguous bit loss due to damaged or dropped packets, this paper presents a cod...
Edward Y. Chang
93
Voted
CN
2006
115views more  CN 2006»
15 years 17 days ago
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, whil...
Tamma Bheemarjuna Reddy, S. Sriram, B. S. Manoj, C...
98
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Rate Adaptation with NAK-Aided Loss Differentiation in 802.11 Wireless Networks
—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
Anne N. Ngugi, Yuanzhu Peter Chen, Qing Li