Sciweavers

5234 search results - page 827 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICC
2007
IEEE
151views Communications» more  ICC 2007»
15 years 10 months ago
Sensing-Throughput Tradeoff for Cognitive Radio Networks
— In cognitive radio networks, the secondary network (users) are allowed to utilize the frequency bands of primary network (users) when they are not currently being used. To supp...
Ying-Chang Liang, Yonghong Zeng, Edward Chu Yeow P...
COMPSAC
2006
IEEE
15 years 10 months ago
An Agent-Based Metric for Quality of Services over Wireless Networks
In a wireless LAN environment, clients tend to associate with the nearest access point (AP) which usually provides the strongest signal. However, this does not guarantee that user...
Yaw-Chung Chen, Wen-Yen Chen
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 10 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
LCN
2006
IEEE
15 years 10 months ago
Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks
: A multi-rate capable IEEE 802.11a/b/g node can utilize different link-layer transmission rates. Interestingly, multi-rate capability is defined by IEEE 802.11 standards only for...
Junaid Qadir, Chun Tung Chou, Archan Misra
ICNP
2003
IEEE
15 years 9 months ago
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
Wei-Peng Chen, Jennifer C. Hou, Lui Sha