Sciweavers

914 search results - page 157 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
SUTC
2010
IEEE
13 years 6 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
IJAHUC
2006
71views more  IJAHUC 2006»
13 years 7 months ago
Elapsed time on arrival: a simple and versatile primitive for canonical time synchronisation services
: Time synchronisation is one of the most important and fundamental middleware services for wireless sensor networks. However, there is an apparent disconnect between existing time...
Branislav Kusy, Prabal Dutta, Philip Levis, Mikl&o...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks
Multicast transmission, wherein the same packet must be delivered to multiple receivers, is an important aspect of sensor and tactical networks and has several distinctive traits ...
Chun-Hung Liu, Jeffrey G. Andrews
IPPS
2007
IEEE
14 years 1 months ago
Aggregate Threshold Queries in Sensor Networks
— An important class of queries over sensor networks are network-wide aggregation queries. In this work we study a class of aggregation queries which we refer to as aggregate thr...
Izchak Sharfman, Assaf Schuster, Daniel Keren