Sciweavers

1150 search results - page 6 / 230
» Beacon Based Authentication
Sort
View
IMC
2003
ACM
14 years 21 days ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...
IJWMC
2006
100views more  IJWMC 2006»
13 years 7 months ago
A microscopic study of power management in IEEE 802.11 wireless networks
IEEE 802.11 power-save mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power manag...
Chunyu Hu, Rong Zheng, Jennifer C. Hou, Lui Sha
JPDC
2006
129views more  JPDC 2006»
13 years 7 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
JCST
2008
144views more  JCST 2008»
13 years 7 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
ADHOCNETS
2010
Springer
13 years 4 months ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch