Sciweavers

798 search results - page 83 / 160
» presence 2006
Sort
View
JHSN
2002
80views more  JHSN 2002»
14 years 9 months ago
A network architecture for providing per-flow delay guarantees with scalable core
Abstract. Many real-time applications demand delay guarantees from the network. A network architecture designed to support these applications should be robust and scalable. The Int...
Prasanna Chaporkar, Joy Kuri
ETT
2000
93views Education» more  ETT 2000»
14 years 9 months ago
Load-Adaptive MUI/ISI-Resilient Generalized Multi-Carrier CDMA with Linear and DF Receivers
A plethora of single-carrier and multi-carrier (MC) CDMA systems have been proposed recently to mitigate intersymbol interference (ISI) and eliminate multiuser interference (MUI). ...
Georgios B. Giannakis, Anastasios Stamoulis, Zheng...
JSAC
2006
111views more  JSAC 2006»
14 years 9 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
NETWORK
2006
177views more  NETWORK 2006»
14 years 9 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
CSREAPSC
2006
14 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...