Sciweavers

174
Voted
COMSUR
2011
251views Hardware» more  COMSUR 2011»
14 years 4 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
COMSUR
2011
230views Hardware» more  COMSUR 2011»
14 years 4 months ago
Low-Density Parity-Check Codes and Their Rateless Relatives
—This survey guides the reader through the extensive open literature that is covering the family of low-density paritycheck (LDPC) codes and their rateless relatives. In doing so...
Nicholas Bonello, Sheng Chen 0001, Lajos Hanzo
COMSUR
2011
203views Hardware» more  COMSUR 2011»
14 years 4 months ago
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious In
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the netw...
Maxwell Young, Raouf Boutaba
COMSUR
2011
228views Hardware» more  COMSUR 2011»
14 years 4 months ago
Energy Harvesting Sensor Nodes: Survey and Implications
Sensor networks with battery-powered nodes can seldom simultaneously meet the design goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy-har...
Sujesha Sudevalayam, Purushottam Kulkarni
COMSUR
2011
219views Hardware» more  COMSUR 2011»
14 years 4 months ago
Link Scheduling Algorithms for Wireless Mesh Networks
Abstract—We provide an overview of link scheduling algorithms in Spatial Time Division Access (STDMA) wireless mesh networks. These algorithms can be classified into three categ...
Ashutosh Deepak Gore, Abhay Karandikar
COMSUR
2011
263views Hardware» more  COMSUR 2011»
14 years 4 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
COMSUR
2011
196views Hardware» more  COMSUR 2011»
14 years 4 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
COMPSYSTECH
2011
14 years 4 months ago
Encoding watermark numbers as cographs using self-inverting permutations
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
Maria Chroni, Stavros D. Nikolopoulos
COMPSAC
2011
IEEE
14 years 4 months ago
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
—Providers of Web-based services can take advantage of many convenient features of cloud computing infrastructures, but they still have to implement request management algorithms...
Riccardo Lancellotti, Mauro Andreolini, Claudia Ca...
COMPSAC
2011
IEEE
14 years 4 months ago
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Abstract—Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such ...
Zhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang