Sciweavers

244 search results - page 15 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
SENSYS
2004
ACM
14 years 1 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
SSS
2009
Springer
162views Control Systems» more  SSS 2009»
14 years 2 months ago
Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning
We consider setting up sleep scheduling in sensor networks. We formulate the problem as an instance of the fractional domatic partition problem and obtain a distributed approximati...
André Schumacher, Harri Haanpää
CN
2007
129views more  CN 2007»
13 years 7 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Multivariate Analysis for Probabilistic WLAN Location Determination Systems
WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique fo...
Moustafa Youssef, Mohamed Abdallah
MOBIHOC
2002
ACM
14 years 7 months ago
Performance analysis of the CONFIDANT protocol
: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate...
Sonja Buchegger, Jean-Yves Le Boudec