Sciweavers

1150 search results - page 4 / 230
» Beacon Based Authentication
Sort
View
LOCA
2005
Springer
14 years 29 days ago
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a mode...
Konrad Lorincz, Matt Welsh
ATAL
2010
Springer
13 years 8 months ago
Collaborative foraging using beacons
A classic example of multiagent coordination in a shared environment involves the use of pheromone deposits as a communication mechanism. Due to physical limitations in deploying ...
Brian Hrolenok, Sean Luke, Keith Sullivan, Christo...
ICRA
2008
IEEE
116views Robotics» more  ICRA 2008»
14 years 1 months ago
A pure probabilistic approach to range-only SLAM
— Range-Only SLAM represents a difficult problem due to the inherent ambiguity of localizing either the robot or the beacons from distance measurements only. Most previous appro...
Jose-Luis Blanco, Javier Gonzalez, Juan-Antonio Fe...
TMC
2010
158views more  TMC 2010»
13 years 5 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
SUTC
2008
IEEE
14 years 1 months ago
Two-Way Beacon Scheduling in ZigBee Tree-Based Wireless Sensor Networks
Broadcast and convergecast are two fundamental operations in wireless sensor networks. Although previous works have addressed energy-efficient and low-latency scheduling, these w...
Lun-Wu Yeh, Meng-Shiuan Pan, Yu-Chee Tseng