Sciweavers

1588 search results - page 122 / 318
» Wireless personal area networks
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
EMNETS
2007
14 years 25 days ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
WMI
2001
147views more  WMI 2001»
13 years 10 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
ICC
2007
IEEE
177views Communications» more  ICC 2007»
14 years 3 months ago
Intelligent Gateways Placement for Reduced Data Latency in Wireless Sensor Networks
— Many applications of wireless sensor networks (WSNs) have emerged over the last few years. In such networks resource-constrained sensor nodes are deployed to probe their surrou...
Waleed A. Youssef, Mohamed F. Younis
MOBIWAC
2006
ACM
14 years 2 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...