Results 1 -
5 of
5
doi:10.1093/comjnl/bxt074 Network Initialization in Low-Power Wireless Networks: A Comprehensive Study
, 2012
"... The increasing growth of low-power wireless networks in real-world implementations has intensified the need to develop well-organized key network building blocks. Neighbor discovery, link quality measurement and data collection are among the fundamental building blocks of network initialization proc ..."
Abstract
- Add to MetaCart
The increasing growth of low-power wireless networks in real-world implementations has intensified the need to develop well-organized key network building blocks. Neighbor discovery, link quality measurement and data collection are among the fundamental building blocks of network initialization
doi:10.1093/comjnl/bxr023 A Depth-optimal Low-complexity Distributed Wireless Multicast Algorithm
, 2010
"... This paper presents a wireless multicast tree construction algorithm, SWIM (Source-initiated WIreless Multicast). SWIM constructs a tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source). It is proved that SWIM is fully distributed, with a wo ..."
Abstract
- Add to MetaCart
This paper presents a wireless multicast tree construction algorithm, SWIM (Source-initiated WIreless Multicast). SWIM constructs a tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source). It is proved that SWIM is fully distributed, with a
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real
doi:10.1093/comjnl/bxv005 Contact Probing Mechanisms for Opportunistic Sensor Data Collection
, 2014
"... In many emerging wireless sensor network scenarios, the use of a fixed infrastructure of base stations for data collection is either infeasible, or prohibitive in terms of deployment and maintenance costs. Instead, we consider the use of mobile devices (i.e. smartphones) carried by people in their d ..."
Abstract
- Add to MetaCart
In many emerging wireless sensor network scenarios, the use of a fixed infrastructure of base stations for data collection is either infeasible, or prohibitive in terms of deployment and maintenance costs. Instead, we consider the use of mobile devices (i.e. smartphones) carried by people
Advance Access published on January 12, 2006 doi:10.1093/comjnl/bxh166 Design of a MANET Testbed Management System
"... The main activities leading towards a testbed validation of routing protocols for MANETs involve code development and experimentation. Because of the characteristics of such networks, these activities are commonly obstructed by the need of managing parameters inherently difficult to control in real ..."
Abstract
- Add to MetaCart
development, initial validation and visualization. The main purpose of MTM is to simulate the main physical elements that can be found in a mobile network while allowing a MANET routing protocol operate concurrently being unaware of the underlying simulation. 1.