Sciweavers

551 search results - page 99 / 111
» On the feasibility of receive collaboration in wireless sens...
Sort
View
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
MOBICOM
2004
ACM
14 years 1 months ago
Choosing beacon periods to improve response times for wireless HTTP clients
The IEEE 802.11 wireless LAN standard power-saving mode (PSM) allows the network interface card (NIC) to periodically sleep between receiving data. In this paper, we show that 802...
Suman Nath, Zachary R. Anderson, Srinivasan Seshan
IROS
2009
IEEE
136views Robotics» more  IROS 2009»
14 years 2 months ago
Integrating asynchronous observations for mobile robot position tracking in cooperative environments
— This paper presents an asynchronous particle filter algorithm for mobile robot position tracking, taking into account time considerations when integrating observations being d...
Andreu Corominas Murtra, Josep Maria Mirats i Tur,...
INFOCOM
2006
IEEE
14 years 1 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
TMC
2008
83views more  TMC 2008»
13 years 7 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...