Sciweavers

914 search results - page 136 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
ICDCS
2010
IEEE
13 years 11 months ago
Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks
—This research focuses on distributed and localized algorithms for precise boundary detection in 3D wireless networks. Our objectives are in two folds. First, we aim to identify ...
Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu
PERCOM
2009
ACM
14 years 2 months ago
Look-ahead Geographic Routing for Sensor Networks
— As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Voids in networks often cause existing geographic routing algorithms ...
Jiaxi You, Dominik Lieckfeldt, Qi Han, Jakob Salzm...
RTCSA
2005
IEEE
14 years 1 months ago
Embedded Sensing of Structures: A Reality Check
With the advent of miniaturized sensing technology, it has become possible to envision smart structures containing millions of sensors embedded in concrete for autonomously detect...
Krishna Chintalapudi, Jeongyeup Paek, Nupur Kothar...
MOBISYS
2007
ACM
14 years 7 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...