Sciweavers

433 search results - page 55 / 87
» Networks and our Limited Information Horizon
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 3 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
ICNP
2002
IEEE
15 years 2 months ago
Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched Networks
The emerging Multi-Protocol Label Switching (MPLS) networks enable network service providers to route bandwidth guaranteed paths between customer sites [3, 2, 8, 5]. This basic La...
Erran L. Li, Milind M. Buddhikot, Chandra Chekuri,...
TMC
2008
78views more  TMC 2008»
14 years 9 months ago
SELECT: Self-Learning Collision Avoidance for Wireless Networks
The limited number of orthogonal channels and autonomous installations of hotspots and home wireless networks often leave neighboring 802.11 basic service sets (BSSs) operating on ...
Chun-cheng Chen, Eunsoo Seo, Hwangnam Kim, Haiyun ...
TCOM
2010
119views more  TCOM 2010»
14 years 8 months ago
Optimization of OFDMA-Based Cellular Cognitive Radio Networks
Abstract— In this paper, we study the coexistence and optimization of a multicell cognitive radio network (CRN) which is overlaid with a multicell primary radio network (PRN). We...
Yao Ma, Dong In Kim, Zhiqiang Wu
SAC
2010
ACM
15 years 4 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...