Sciweavers

4049 search results - page 422 / 810
» Neural Network Trainer through Computer Networks
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
BROADNETS
2004
IEEE
15 years 8 months ago
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables simultaneous transmissions in wireless mesh networks. The IE...
Arup Acharya, Archan Misra, Sorav Bansal
BROADNETS
2004
IEEE
15 years 8 months ago
Design and Analysis of a Fast Local Clustering Service for Wireless Sensor Networks
We present a fast local clustering service, FLOC, that partitions a multi-hop wireless network into nonoverlapping and approximately equal-sized clusters. Each cluster has a clust...
Murat Demirbas, Anish Arora, Vineet Mittal, Vinod ...
CAMAD
2006
IEEE
15 years 8 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
DSN
2004
IEEE
15 years 8 months ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders