Sciweavers

1306 search results - page 177 / 262
» Localizing Jammers in Wireless Networks
Sort
View
ACSAC
2007
IEEE
14 years 5 days ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
INFOCOM
2011
IEEE
12 years 12 months ago
Distinguishing locations across perimeters using wireless link measurements
—Perimeter distinction in a wireless network is the ability to distinguish locations belonging to different perimeters. It is complementary to existing localization techniques. A...
Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, P...
IEEECIT
2010
IEEE
13 years 6 months ago
A Learning Spectrum Hole Prediction Model for Cognitive Radio Systems
—In this paper, we present a new spectrum-hole prediction model for cognitive radio (CR) systems based on the IEEE 802.11 wireless local areas networks. We have also analyzed the...
Zhigang Wen, Chunxiao Fan, Xiaoying Zhang, Yuexin ...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung
WCE
2007
13 years 9 months ago
Digital Transceiver using H-Ternary Line Coding Technique
– In this paper “Digital Transceiver using Hybrid Ternary Technique” gives the details about digital transmitter and receiver with the design of a hybrid ternary line coding....
A. Mahadevan