Abstract— We have demonstrated that a properlyequipped mobile robot can easily construct a detailed map of the wireless coverage of an urban environment. The Autonomous Vehicle f...
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
: We present a predictive handoff mechanism that can predict the occurrence of L2 handoff well. It can be used as a trigger for Mobile IP to start network layer handoff ahead exact...
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...