Sciweavers

46931 search results - page 9292 / 9387
» Networking the networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 10 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
TSP
2008
132views more  TSP 2008»
14 years 10 months ago
Differential Modulations for Multinode Cooperative Communications
Abstract--This paper proposes and analyzes differential modulation schemes for two cooperation protocols in multinode cooperative wireless networks; namely, multinode differential ...
Thanongsak Himsoon, W. Pam Siriwongpairat, Weifeng...
AEI
2004
114views more  AEI 2004»
14 years 10 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...
JSAC
2007
101views more  JSAC 2007»
14 years 10 months ago
CoopMAC: A Cooperative MAC for Wireless LANs
— Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus o...
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis K...
JSAC
2007
116views more  JSAC 2007»
14 years 10 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
« Prev « First page 9292 / 9387 Last » Next »