Sciweavers

102 search results - page 14 / 21
» Effective Intrusion Detection Using Multiple Sensors in Wire...
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
WIOPT
2006
IEEE
14 years 2 months ago
Analytical modeling of ad hoc networks that utilize space-time coding
— This paper presents the first analytical model for ad hoc networks equipped with multiple-input multiple-output (MIMO) radios using space-time coding (STC) that considers the ...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
INFOCOM
2011
IEEE
13 years 8 days ago
Fine-grained location-free planarization in wireless sensor networks
—Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topol...
Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang L...
INFOCOM
2006
IEEE
14 years 2 months ago
Optimal Distributed Detection in Clustered Wireless Sensor Networks: The Weighted Median
− In a clustered, multi-hop sensor network, a large number of inexpensive, geographically-distributed sensor nodes each use their observations of the environment to make local ha...
Qingjiang Tian, Edward J. Coyle
GLOBECOM
2006
IEEE
14 years 2 months ago
A Directional MAC Protocol for Practical Smart Antennas
- Recently, several MAC protocols using directional antennas, typically referred to as directional MAC protocols, have been proposed for wireless ad hoc networks. However, the MAC ...
Yuya Takatsuka, Katsushiro Nagashima, Masanori Tak...