Sciweavers

3971 search results - page 712 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
PERCOM
2003
ACM
14 years 10 months ago
Dynamic Application Composition: Customizing the Behavior of an Active Space
The proliferation of wireless networks, hand-held PCs, touch panels, large flat displays, sensors, and embedded devices is transforming traditional habitats and living spaces into...
Brian Ziebart, Manuel Román, Roy H. Campbel...
EWSN
2010
Springer
14 years 7 months ago
Radio Interferometric Angle of Arrival Estimation
Abstract. Several localization algorithms exist for wireless sensor networks that use angle of arrival measurements to estimate node position. However, there are limited options fo...
Isaac Amundson, János Sallai, Xenofon D. Ko...
MOBICOM
2006
ACM
14 years 4 months ago
Coverage and connectivity in three-dimensional networks
Although most wireless terrestrial networks are based on twodimensional (2D) design, in reality, such networks operate in threedimensions (3D). Since most often the size (i.e., th...
S. M. Nazrul Alam, Zygmunt J. Haas
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 10 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
CODES
2008
IEEE
14 years 5 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...