Sciweavers

1003 search results - page 161 / 201
» Optimizing Resource Utilization in Wireless Multimedia Netwo...
Sort
View
INFOCOM
2010
IEEE
15 years 1 months ago
Enhancing Wireless TCP: A Serialized-Timer Approach
— In wireless networks, TCP performs unsatisfactorily since packet reordering and random losses may be falsely interpreted as congestive losses. This causes TCP to trigger fast r...
Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li
TIFS
2008
208views more  TIFS 2008»
15 years 3 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
IJNSEC
2007
137views more  IJNSEC 2007»
15 years 3 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
ICC
2007
IEEE
15 years 9 months ago
Link Error Prediction in Wireless Communication Systems with Quality Based Power Control
— The quality of end-to-end services over wireless communication networks highly depends on the error characteristics of the wireless links. By utilizing the link error character...
Wolfgang Karner, Olivia Nemethova, Markus Rupp
IWCMC
2006
ACM
15 years 9 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras