Sciweavers

11927 search results - page 2019 / 2386
» Wireless Sensor Networks
Sort
View
ICPADS
2007
IEEE
15 years 11 months ago
Federated clusters using the transparent remote Execution (TREx) environment
- Due to the increasing complexity of scientific models, large-scale simulation tools often require a critical amount of computational power to produce results in a reasonable amou...
Richert Wang, Enrique Cauich, Isaac D. Scherson
INFOCOM
2007
IEEE
15 years 11 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
IPPS
2007
IEEE
15 years 11 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICISS
2007
Springer
15 years 11 months ago
Investigating the Impact of Real-World Factors on Internet Worm Propagation
This paper reports the results of our experimentation with modeling worm behavior on a large scale, fully adaptable network simulator. Our experiments focused on areas of worm scan...
Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, J...
NEW2AN
2007
Springer
15 years 11 months ago
Real Life Field Trial over a Pre-mobile WiMAX System with 4th Order Diversity
Mobile WiMAX is a promising wireless technology approaching market deployment. Much discussion concentrate on whether mobile WiMAX will reach a tipping point and become 4G or not. ...
Pål Grønsund, Paal Engelstad, Moti Ay...
« Prev « First page 2019 / 2386 Last » Next »