Sciweavers

3793 search results - page 634 / 759
» The wireless synchronization problem
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 3 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
DASFAA
2007
IEEE
190views Database» more  DASFAA 2007»
14 years 3 months ago
Clustering Moving Objects in Spatial Networks
Advances in wireless networks and positioning technologies (e.g., GPS) have enabled new data management applications that monitor moving objects. In such new applications, realtime...
Jidong Chen, Caifeng Lai, Xiaofeng Meng, Jianliang...
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 3 months ago
Power Allocation in Multi-Carrier Networks with Unicast and Multicast Services
—Since the provision of both unicast and multicast services is expected for the next generation of multi-carrier wireless systems, the allocation of resources for this combinatio...
Yuri C. B. Silva, Anja Klein
ICC
2007
IEEE
174views Communications» more  ICC 2007»
14 years 3 months ago
Fairness Improvement and Efficient Rerouting in Mobile Ad Hoc Networks
— Mobile ad hoc networking allows nodes to form temporary networks and communicate with each other possibly via multiple hops. By using a special node called the gateway, an ad h...
Norihiro Ohata, Yongbing Zhang, Yusheng Ji, Xuemin...