Sciweavers

1482 search results - page 251 / 297
» Wireless LAN Security
Sort
View
CORR
2008
Springer
139views Education» more  CORR 2008»
14 years 9 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
JPDC
2006
134views more  JPDC 2006»
14 years 9 months ago
Fast shared-memory algorithms for computing the minimum spanning forest of sparse graphs
Minimum Spanning Tree (MST) is one of the most studied combinatorial problems with practical applications in VLSI layout, wireless communication, and distributed networks, recent ...
David A. Bader, Guojing Cong
FTNET
2007
80views more  FTNET 2007»
14 years 9 months ago
Network Coding Applications
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology...
Christina Fragouli, Emina Soljanin
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 1 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
APSCC
2008
IEEE
15 years 4 months ago
Design of MyServer: A Residential Server in Smart Home Systems
This paper addresses the design and implementtation of a residential gateway: MyServer, which is to provide services regarding home security, inventory tracking, facility manageme...
Wei-Chung Teng, Yu-Chun Pao, Sheng-Luen Chung