Sciweavers

4985 search results - page 248 / 997
» Re-Configurable Computing in Wireless
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
MSWIM
2006
ACM
15 years 10 months ago
Interference-constrained wireless coverage in a protocol model
We present an efficient algorithm to compute the coverage map of a given set of transmitters under interference constraints. That is, we compute the set of points that lie within ...
Prateek R. Kapadia, Om P. Damani
ICPPW
2005
IEEE
15 years 10 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
DCOSS
2009
Springer
15 years 11 months ago
Online Coding for Reliable Data Transfer in Lossy Wireless Sensor Networks
Bulk transport underlies data exfiltration and code update facilities in WSNs, but existing approaches are not designed for highly lossy and variable-quality links. We observe tha...
Anthony D. Wood, John A. Stankovic
APNOMS
2007
Springer
15 years 10 months ago
Scheduling Management in Wireless Mesh Networks
We propose a greedy algorithm to investigate the problem of how to schedule of a set of feasible transmissions under physical interference model. We also consider the fairness in s...
Nguyen H. Tran, Choong Seon Hong