Sciweavers

914 search results - page 168 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
INFOCOM
2006
IEEE
14 years 1 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
DASFAA
2006
IEEE
153views Database» more  DASFAA 2006»
14 years 1 months ago
DAPSS: Exact Subsequence Matching for Data Streams
There is much interest in the processing of data streams for applications in the fields such as financial analysis, network monitoring, mobile services, and sensor network manage...
Yasuhiro Fujiwara, Yasushi Sakurai, Masashi Yamamu...
SENSYS
2010
ACM
13 years 5 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...
ISWC
2002
IEEE
14 years 16 days ago
Minimal Social Weight User Interactions for Wearable Computers in Business Suits
This paper presents the e-SUIT, a wearable computer incorporated in a traditional business suit. A key feature of the system is an array of input/output devices integrated into th...
Aaron Toney, Barrie Mulley, Bruce H. Thomas, Wayne...