Sciweavers

131 search results - page 16 / 27
» The Wireless Control Network: Synthesis and robustness
Sort
View
MOBISYS
2011
ACM
14 years 14 days ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
FTNET
2007
107views more  FTNET 2007»
14 years 9 months ago
Network Optimization and Control
We study how protocol design for various functionalities within a communication network architecture can be viewed as a distributed resource allocation problem. This involves unde...
Srinivas Shakkottai, R. Srikant
TPDS
2008
202views more  TPDS 2008»
14 years 9 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
WS
2006
ACM
15 years 3 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
CN
2002
169views more  CN 2002»
14 years 9 months ago
A new wireless ad hoc multicast routing protocol
An ad hoc network is a multi-hop wireless network of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and mobility require that ad hoc routing prot...
Seungjoon Lee, Chongkwon Kim