Sciweavers

90 search results - page 15 / 18
» Flooding strategy for target discovery in wireless networks
Sort
View
ICRA
2008
IEEE
166views Robotics» more  ICRA 2008»
14 years 1 months ago
Vision-based docking using an autonomous surface vehicle
This paper describes the development and experimental evaluation of a novel vision-based Autonomous Surface Vehicle with the purpose of performing coordinated docking manoeuvres w...
Matthew Dunbabin, Brenton Lang, Brett Wood
WISEC
2010
ACM
14 years 9 hour ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
NETWORK
2007
234views more  NETWORK 2007»
13 years 6 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
MOBISYS
2004
ACM
14 years 6 months ago
Energy-Efficient Surveillance System Using Wireless Sensor Networks
The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of ri...
Tian He, Sudha Krishnamurthy, John A. Stankovic, T...
IPPS
2006
IEEE
14 years 22 days ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...