Sciweavers

2138 search results - page 273 / 428
» Emergency Evacuation using Wireless Sensor Networks
Sort
View
132
Voted
WS
2006
ACM
15 years 10 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
MOBIHOC
2006
ACM
16 years 4 months ago
DRAND: : distributed randomized TDMA scheduling for wireless ad-hoc networks
This paper presents a distributed implementation of RAND, a randomized time slot scheduling algorithm, called DRAND. DRAND runs in O() time and message complexity where is the max...
Injong Rhee, Ajit Warrier, Jeongki Min, Lisong Xu
WIOPT
2005
IEEE
15 years 10 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
IFIP
2003
Springer
15 years 10 months ago
Collaborative and Distributed Computation in Mesh-Like Wireless Sensor Arrays
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...
Mitali Singh, Viktor K. Prasanna, José D. P...
ICASSP
2011
IEEE
14 years 8 months ago
Cooperative mobile network localization via subspace tracking
Two novel cooperative localization algorithms for mobile wireless networks are proposed. To continuously localize the mobile network, given the pairwise distance measurements betw...
Hadi Jamali Rad, Alon Amar, Geert Leus