Sciweavers

5512 search results - page 993 / 1103
» Mobile networks unplugged
Sort
View
WIMOB
2008
IEEE
14 years 5 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
ICC
2007
IEEE
150views Communications» more  ICC 2007»
14 years 5 months ago
Utility-based Optimal Rate Allocation for Heterogeneous Wireless Multicast
Abstract— Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks when multicast receivers in the same...
Amr M. Mohamed, Hussein M. Alnuweiri
NETCOOP
2007
Springer
14 years 4 months ago
Minimum Transmission Energy Trajectories for a Linear Pursuit Problem
In this paper we study a pursuit problem in the context of a wireless sensor network, where the pursuer (i.e., mobile sink) trying to capture a pursuee (i.e., tracked object), movi...
Attila Vidács, Jorma T. Virtamo
MOBIWAC
2006
ACM
14 years 4 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
ICIAR
2005
Springer
14 years 4 months ago
Text-Pose Estimation in 3D Using Edge-Direction Distributions
Abstract. This paper presents a method for estimating the orientation of planar text surfaces using the edge-direction distribution (EDD) extracted from the image as input to a neu...
Marius Bulacu, Lambert Schomaker