Sciweavers

1379 search results - page 267 / 276
» Contention-Free MAC Protocols for Wireless Sensor Networks
Sort
View
122
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
On exploiting asymmetric wireless links via one-way estimation
A substantial percentage of links in wireless networks, especially low-power ones, is asymmetric. For the low-quality direction of asymmetric links, we observe based on testbed ex...
Lifeng Sang, Anish Arora, Hongwei Zhang
138
Voted
WS
2004
ACM
15 years 9 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
130
Voted
IMC
2007
ACM
15 years 5 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
109
Voted
JNW
2008
144views more  JNW 2008»
15 years 3 months ago
Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs
Research on data routing strategies for wireless sensor networks (WSNs) has largely focused on energy efficiency. However rapid advances in WSNs require routing protocols which can...
Donggeon Noh, Ikjune Yoon, Heonshik Shin
129
Voted
AINA
2007
IEEE
15 years 10 months ago
Pervasive Service Composition in the Home Network
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
André Bottaro, Anne Gérodolle, Phili...