Sciweavers

4985 search results - page 325 / 997
» Re-Configurable Computing in Wireless
Sort
View
PAM
2009
Springer
15 years 11 months ago
Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks
Abstract. Multi-channel multi-radio architectures have been widely studied for 802.11-based wireless mesh networks to address the capacity problem due to wireless interference. The...
Anand Prabhu Subramanian, Jing Cao, Chul Sung, Sam...
DSN
2009
IEEE
15 years 11 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
ICC
2009
IEEE
239views Communications» more  ICC 2009»
15 years 11 months ago
An Analytical Approach for Throughput Evaluation of Wireless Network Coding
In this paper, we propose a new analytical model for throughput evaluation of wireless network coding. This new approach is based on a probabilistic viewpoint on network coding, i....
Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Ba...
179
Voted
IEEESCC
2009
IEEE
15 years 11 months ago
Context Aware Middleware Architecture for Wireless Sensor Network
Wireless sensor networks are application specific, data centric networks where different applications run on deployed network. Each application interprets the underlying sensor n...
Pankesh Patel, Sunil Jardosh, Sanjay Chaudhary, Pr...
ADHOCNETS
2009
Springer
15 years 11 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong