Sciweavers

3793 search results - page 754 / 759
» Securing Sensor Reports in Wireless Sensor Networks*
Sort
View
144
Voted
ADHOC
2007
122views more  ADHOC 2007»
15 years 3 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
168
Voted
TCOM
2010
117views more  TCOM 2010»
15 years 2 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
169
Voted
CORR
2010
Springer
177views Education» more  CORR 2010»
15 years 12 days ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
160
Voted
ICDCS
2011
IEEE
14 years 3 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
137
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...