Sciweavers

11217 search results - page 1825 / 2244
» Network Coding for Wireless Networks
Sort
View
CSREAEEE
2006
182views Business» more  CSREAEEE 2006»
15 years 5 months ago
NGOSS-based convergent OSS framework using BPM for converged e-business environment
Recently, most wired telecom service carriers are faced to decreasing of the number of subscriber because of the expansion of wireless market and blocking of net earnings. To over...
Cheol-Seong Kim, Byung-Soo Chang, Sung-il Kim
CSREASAM
2006
15 years 5 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
IJIT
2004
15 years 5 months ago
Enhance Performance of Secure Image Using Wavelet Compression
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication ...
Goh Han Keat, Azman Samsudin, Zurinahni Zainol
SIGCOMM
2010
ACM
15 years 4 months ago
Vehicular wifi access and rate adaptation
Abstract--Vehicular WiFi access is distinct in two respects, (i) continuous mobility of clients and (ii) possibility of predictable link quality. As part of this study, we aim to c...
Ajinkya Uday Joshi, Purushottam Kulkarni
COMCOM
2006
79views more  COMCOM 2006»
15 years 4 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
« Prev « First page 1825 / 2244 Last » Next »