Sciweavers

4761 search results - page 774 / 953
» Performance of Protocols
Sort
View
178
Voted
ICDCSW
2009
IEEE
15 years 10 months ago
EDLA Tradeoffs for Wireless Sensor Network Target Tracking
—The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network’s data. As node hibernation techniq...
Richard Tynan, Gregory M. P. O'Hare, Michael J. O'...
138
Voted
ICNS
2009
IEEE
15 years 10 months ago
Balancing Load of APs by Concurrent Association of Every Wireless Node with Many APs
Abstract— In this paper we propose a novel method for associating Wireless Mobile Nodes (WMNs) to Access Points (APs) in busy Wireless access networks. The proposed method associ...
Dilip Sarkar, Uttam K. Sarkar
125
Voted
ICNS
2009
IEEE
15 years 10 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
124
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks
— This paper deals with the problem of reliable and fast broadcast of mission-critical data with rich content over ad hoc networks. Existing approaches to dissemination reliabili...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
138
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...