Sciweavers

914 search results - page 162 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
PODC
2009
ACM
14 years 8 months ago
Coloring unstructured wireless multi-hop networks
We present a randomized coloring algorithm for the unstructured radio network model, a model comprising autonomous nodes, asynchronous wake-up, no collision detection and an unkno...
Johannes Schneider, Roger Wattenhofer
GLOBECOM
2010
IEEE
13 years 5 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
13 years 11 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
IROS
2009
IEEE
174views Robotics» more  IROS 2009»
14 years 2 months ago
Characterization and modeling of wireless channels for networked robotic and control systems - a comprehensive overview
— The goal of this paper is to serve as a reference for researchers in robotics and control that are interested in realistic modeling, theoretical analysis and simulation of wire...
Yasamin Mostofi, Alejandro Gonzalez-Ruiz, Alireza ...
RTSS
2009
IEEE
14 years 2 months ago
Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks
Abstract—Multi-channel design has received significant attention for low-power wireless networks (LWNs), such as 802.15.4-based wireless sensor networks, due to its potential of...
Guoliang Xing, Mo Sha, Jun Huang, Gang Zhou, Xiaor...