Sciweavers

8259 search results - page 249 / 1652
» On Generalized Feistel Networks
Sort
View
118
Voted
ADHOCNETS
2009
Springer
15 years 7 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
IWCMC
2009
ACM
15 years 7 months ago
Adaptive video streaming over a mobile network with TCP-friendly rate control
This paper investigates the performance of TCP-Friendly Rate Control (TFRC) to control the transmission rate of scalable video streams when used in a mobile network. The streams a...
Ktawut Tappayuthpijarn, Günther Liebl, Thomas...
82
Voted
ICIP
2008
IEEE
15 years 7 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
91
Voted
SECON
2008
IEEE
15 years 7 months ago
Per User Throughput in Large Wireless Networks
— Previous results show that a node’s throughput scales poorly as the network size increases when every node has traffic. However, in many cases, only a fraction of nodes in l...
Dan Xu, Xin Liu
100
Voted
WMCSA
2008
IEEE
15 years 7 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot