Sciweavers

244 search results - page 30 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
TPDS
2008
157views more  TPDS 2008»
13 years 7 months ago
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
Bin Xiao, Hekang Chen, Shuigeng Zhou
TPDS
2010
159views more  TPDS 2010»
13 years 6 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
ICCS
2005
Springer
14 years 1 months ago
Investigation of Cache Coherence Strategies in a Mobile Client/Server Environment
In this article, we present an investigation case study based on an implementation and performance analysis of three different cache coherence strategies over a real wireless envi...
Carla Diacui Medeiros Berkenbrock, Mario A. R. Dan...
FMCO
2007
Springer
169views Formal Methods» more  FMCO 2007»
14 years 1 months ago
An Object-Oriented Component Model for Heterogeneous Nets
Abstract. Many distributed applications can be understood in terms of components interacting in an open environment. This interaction is not always uniform as the network may consi...
Einar Broch Johnsen, Olaf Owe, Joakim Bjørk...
MOBIHOC
2007
ACM
14 years 7 months ago
Allocating dynamic time-spectrum blocks in cognitive radio networks
A number of studies have shown the abundance of unused spectrum in the TV bands. This is in stark contrast to the overcrowding of wireless devices in the ISM bands. A recent trend...
Yuan Yuan, Paramvir Bahl, Ranveer Chandra, Thomas ...