Sciweavers

361 search results - page 70 / 73
» Attack Detection in Wireless Localization
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
MOBISYS
2003
ACM
14 years 7 months ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...
ADHOCNOW
2008
Springer
14 years 1 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ICPP
2005
IEEE
14 years 1 months ago
BluePower - A New Distributed Multihop Scatternet Formation Protocol for Bluetooth Networks
Bluetooth is a promising local area wireless technology designed to establish both personal area and multihop ad hoc networks. In this paper, we present BluePower as a novel and p...
Yuanrui Zhang, Shu Liu, Weijia Jia, Xu Cheng
ICRA
1998
IEEE
114views Robotics» more  ICRA 1998»
13 years 11 months ago
A Twenty-Four Hour Tele-Nursing System Using a Ring Sensor
The objective of this paper is to present the recent development of the ring sensor to monitor a patient 24 hours a day for a tele-nursing system. The ring sensor is worn by the p...
Boo-Ho Yang, Sokwoo Rhee, Haruhiko Asada