• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 5 of 5

doi:10.1093/comjnl/bxt074 Network Initialization in Low-Power Wireless Networks: A Comprehensive Study

by Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, Shukor Abd Razak, Malrey Lee , 2012
"... The increasing growth of low-power wireless networks in real-world implementations has intensified the need to develop well-organized key network building blocks. Neighbor discovery, link quality measurement and data collection are among the fundamental building blocks of network initialization proc ..."
Abstract - Add to MetaCart
The increasing growth of low-power wireless networks in real-world implementations has intensified the need to develop well-organized key network building blocks. Neighbor discovery, link quality measurement and data collection are among the fundamental building blocks of network initialization

doi:10.1093/comjnl/bxr023 A Depth-optimal Low-complexity Distributed Wireless Multicast Algorithm

by A. Sinan Akyurek, Elif Uysal-biyikoglu , 2010
"... This paper presents a wireless multicast tree construction algorithm, SWIM (Source-initiated WIreless Multicast). SWIM constructs a tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source). It is proved that SWIM is fully distributed, with a wo ..."
Abstract - Add to MetaCart
This paper presents a wireless multicast tree construction algorithm, SWIM (Source-initiated WIreless Multicast). SWIM constructs a tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source). It is proved that SWIM is fully distributed, with a

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real

doi:10.1093/comjnl/bxv005 Contact Probing Mechanisms for Opportunistic Sensor Data Collection

by Xiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan , 2014
"... In many emerging wireless sensor network scenarios, the use of a fixed infrastructure of base stations for data collection is either infeasible, or prohibitive in terms of deployment and maintenance costs. Instead, we consider the use of mobile devices (i.e. smartphones) carried by people in their d ..."
Abstract - Add to MetaCart
In many emerging wireless sensor network scenarios, the use of a fixed infrastructure of base stations for data collection is either infeasible, or prohibitive in terms of deployment and maintenance costs. Instead, we consider the use of mobile devices (i.e. smartphones) carried by people

Advance Access published on January 12, 2006 doi:10.1093/comjnl/bxh166 Design of a MANET Testbed Management System

by Ricardo Lent
"... The main activities leading towards a testbed validation of routing protocols for MANETs involve code development and experimentation. Because of the characteristics of such networks, these activities are commonly obstructed by the need of managing parameters inherently difficult to control in real ..."
Abstract - Add to MetaCart
development, initial validation and visualization. The main purpose of MTM is to simulate the main physical elements that can be found in a mobile network while allowing a MANET routing protocol operate concurrently being unaware of the underlying simulation. 1.
Results 1 - 5 of 5
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University