Sciweavers

678 search results - page 82 / 136
» Myopic Coding in Wireless Networks
Sort
View
ICDCS
2008
IEEE
15 years 10 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 10 months ago
Performance Analysis of Adaptive Rate Scheduling Scheme for 3G WCDMA Wireless Networks with Multi-Operators
— Sharing of 3G network infrastructure among operators offers an alternative solution to reducing the investment in the coverage phase of WCDMA. For radio access network (RAN) sh...
Salman AlQahtani, Ashraf S. Mahmoud, Asrar U. Shei...
IDMS
1998
Springer
141views Multimedia» more  IDMS 1998»
15 years 8 months ago
An Image Coding and Reconstruction Scheme for Mobile Computing
An asynchronous transfer mode (ATM) wireless network has bursty and high error rates. To combat the contiguous bit loss due to damaged or dropped packets, this paper presents a cod...
Edward Y. Chang
CN
2006
115views more  CN 2006»
15 years 3 months ago
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, whil...
Tamma Bheemarjuna Reddy, S. Sriram, B. S. Manoj, C...
GLOBECOM
2009
IEEE
15 years 10 months ago
Rate Adaptation with NAK-Aided Loss Differentiation in 802.11 Wireless Networks
—The Physical Layer of the IEEE 802.11 standard family provides a set of different modulation and coding schemes and, thus, a multitude of data rates. However, the Standard itsel...
Anne N. Ngugi, Yuanzhu Peter Chen, Qing Li