Sciweavers

274 search results - page 11 / 55
» infocom 2010
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
INFOCOM
2010
IEEE
14 years 8 months ago
High Performance Dictionary-Based String Matching for Deep Packet Inspection
—Dictionary-Based String Matching (DBSM) is used in network Deep Packet Inspection (DPI) applications virus scanning [1] and network intrusion detection [2]. We propose the Pipel...
Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna
58
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Pattern Mutation in Wireless Sensor Deployment
—In this paper, we study the optimal deployment pattern problem in wireless sensor networks (WSNs). We propose a new set of patterns, particularly when sensors’ communication r...
Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia, Wei ...
INFOCOM
2010
IEEE
14 years 8 months ago
Reliable GPS-Free Double-Ruling-Based Information Brokerage in Wireless Sensor Networks
Abstract—Because the global positioning system (GPS) consumes a large amount of power and does not work indoors, many GPS-free information brokerage schemes are proposed for wire...
Chia-Hung Lin, Jian-Jhih Kuo, Ming-Jer Tsai
80
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Approximate Capacity Subregions of Uniform Multihop Wireless Networks
—The capacity region of multihop wireless network is involved in many capacity optimization problems. However, the membership of the capacity region is NP-complete in general, an...
Peng-Jun Wan, Lixin Wang, Ai Huang, Minming Li, F....