Sciweavers

2189 search results - page 436 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
ICDCS
2011
IEEE
12 years 9 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
MOBICOM
2009
ACM
14 years 4 months ago
Interference management via rate splitting and HARQ over time-varying fading channels
The coexistence of two unlicensed links is considered, where one link interferes with the transmission of the other, over a timevarying, block-fading channel. In the absence of fa...
Marco Levorato, Osvaldo Simeone, Urbashi Mitra
PERCOM
2008
ACM
14 years 4 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 4 months ago
Cooperation and Cognitive Radio
Abstract— Cooperation is increasingly regarded as a key technology for tackling the challenges of a practical implementation of cognitive radio. In this paper, we first give a b...
Osvaldo Simeone, Jonathan Gambini, Yeheskel Bar-Ne...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 10 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...