Sciweavers

120 search results - page 13 / 24
» Analysis of consensus protocols with bounded measurement err...
Sort
View
WISEC
2010
ACM
14 years 14 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
ICASSP
2011
IEEE
12 years 11 months ago
Convergence results in distributed Kalman filtering
Abstract—The paper studies the convergence properties of the estimation error processes in distributed Kalman filtering for potentially unstable linear dynamical systems. In par...
Soummya Kar, Shuguang Cui, H. Vincent Poor, Jos&ea...
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 2 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
MOC
2011
13 years 2 months ago
Local energy estimates for the finite element method on sharply varying grids
Abstract. Local energy error estimates for the finite element method for elliptic problems were originally proved in 1974 by Nitsche and Schatz. These estimates show that the loca...
Alan Demlow, Johnny Guzmán, Alfred H. Schat...
INFOCOM
2008
IEEE
14 years 2 months ago
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding
— While the practical coding scheme [1] has been shown to be able to improve throughput of wireless networks, there still lacks fundamental understanding on how the coding scheme...
Jilin Le, John C. S. Lui, Dah-Ming Chiu