Sciweavers

291 search results - page 23 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
VTC
2006
IEEE
106views Communications» more  VTC 2006»
15 years 10 months ago
Rate Regions of Asymmetrical Multiple Access with Receive Diversity
— Based on the specification of a high-throughput wireless local area network system we consider the achievable rate regions of time, frequency and code division multiple access...
Thomas Deckert, Sebastian Kaiser, Gerhard Fettweis
142
Voted
ISORC
2007
IEEE
15 years 10 months ago
LSynD: Localized Synopsis Diffusion
Wireless sensor networks represent an extremely fastgrowing emerging technology, but still suffer from several limitations. The state of the art in sensor networks focuses on opti...
Andreea Berfield, Panos K. Chrysanthis, Daniel Mos...
128
Voted
AINA
2007
IEEE
15 years 10 months ago
An Adaptive Localized Algorithm for Multiple Sensor Area Coverage
— Wireless sensor networks are made up of hundreds of devices deployed over a distant or sensitive field to be monitored. Energy consumption is balanced by taking advantage of t...
Antoine Gallais, Jean Carle
EMNETS
2007
15 years 7 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son