Sciweavers

840 search results - page 158 / 168
» How Long is the Lifetime of a Wireless Sensor Network
Sort
View
TMC
2008
83views more  TMC 2008»
13 years 8 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
KIVS
2009
Springer
14 years 1 months ago
Banishing Patch-Cables from LAN Parties
Abstract. Although playing real-time multi-player games online over the Internet became more and more popular in the past few years, people still enjoy meeting for so-called “LAN...
Peter Baumung
WS
2004
ACM
14 years 1 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
DBISP2P
2004
Springer
131views Database» more  DBISP2P 2004»
14 years 1 months ago
Dissemination of Spatial-Temporal Information in Mobile Networks with Hotspots
In this paper we examine the dissemination of reports about resources in mobile networks with hotspots, where hotspots, vehicles and sensors communicate with each other via short-r...
Ouri Wolfson, Bo Xu, Huabei Yin
BSN
2009
IEEE
160views Sensor Networks» more  BSN 2009»
14 years 3 months ago
BSN Simulator: Optimizing Application Using System Level Simulation
—A biomonitoring application running on wireless BAN has stringent timing and energy requirements. Developing such applications therefore presents unique challenges in both hardw...
Ioana Cutcutache, Thi Thanh Nga Dang, Wai Kay Leon...