Sciweavers

1306 search results - page 242 / 262
» Localizing Jammers in Wireless Networks
Sort
View
WIOPT
2006
IEEE
14 years 1 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
14 years 1 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu
IWCMC
2010
ACM
14 years 24 days ago
An oversampling approach for LoS-ToA estimation in interleaved OFDMA
Line-of-sight (LoS) time-of-arrival (ToA) is one of key parameters for network-based localization techniques. Its estimation accuracy depends on the bandwidth of transmitted signa...
Ziming He, Yi Ma, Rahim Tafazolli, Hongju Liu
ICDCS
1996
IEEE
13 years 12 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
AINA
2010
IEEE
13 years 11 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores