Sciweavers

914 search results - page 147 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Multiple Target Localisation in Sensor Networks with Location Privacy
Abstract. It is now well known that data-fusion from multiple sensors can improve detection and localisation of targets. Traditional data fusion requires the sharing of detailed da...
Matthew Roughan, Jon Arnold
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
14 years 1 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
ATAL
2004
Springer
14 years 1 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
JCM
2007
177views more  JCM 2007»
13 years 7 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 7 months ago
Rethinking Information Theory for Mobile Ad Hoc Networks
The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundam...
Jeffrey G. Andrews, Nihar Jindal, Martin Haenggi, ...