Sciweavers

1518 search results - page 144 / 304
» Point-Casting Service in Wireless Networks
Sort
View
WS
2006
ACM
14 years 4 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
GLOBECOM
2007
IEEE
14 years 4 months ago
Network-Calculus-Based Analysis of Power Management in Video Sensor Networks
— This paper considers two important issues for video sensor network, (1) timely delivery of captured video stream and (2) energy-efficient network design. Based on network calc...
Yanchuan Cao, Yuan Xue, Yi Cui
PERCOM
2008
ACM
14 years 10 months ago
Composition and Generalization of Context Data for Privacy Preservation
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
WSNA
2003
ACM
14 years 3 months ago
The coverage problem in a wireless sensor network
One fundamental issue in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this pr...
Chi-Fu Huang, Yu-Chee Tseng
ICNP
2006
IEEE
14 years 4 months ago
RAIN: A Reliable Wireless Network Architecture
Abstract— Despite years of research and development, pioneering deployments of multihop wireless networks have not proven successful. The performance of routing and transport is ...
Chaegwon Lim, Haiyun Luo, Chong-Ho Choi