Sciweavers

244 search results - page 18 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
SECON
2007
IEEE
14 years 1 months ago
High-Level Application Development is Realistic for Wireless Sensor Networks
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
Marcin Karpinski, Vinny Cahill
ICDCS
2008
IEEE
14 years 2 months ago
Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks
—Recently, opportunistic routing (OR) has been widely used to compensate for the low packet delivery ratio of multi-hop wireless networks. Previous works either provide heuristic...
Jie Wu, Mingming Lu, Feng Li
PIMRC
2008
IEEE
14 years 1 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
INFOCOM
2003
IEEE
14 years 25 days ago
Understanding TCP fairness over Wireless LAN
— As local area wireless networks based on the IEEE 802.11 standard see increasing public deployment, it is important to ensure that access to the network by different users rema...
Saar Pilosof, Ramachandran Ramjee, Danny Raz, Yuva...
ADHOC
2007
100views more  ADHOC 2007»
13 years 7 months ago
A GPS-less, outdoor, self-positioning method for wireless sensor networks
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...
Hung-Chi Chu, Rong-Hong Jan