Sciweavers

1588 search results - page 178 / 318
» Wireless personal area networks
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
PODC
2010
ACM
14 years 29 days ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...
AICT
2009
IEEE
144views Communications» more  AICT 2009»
14 years 3 months ago
Fingerprinting-Based Localization in WiMAX Networks Depending on SCORE Measurements
—Recently, localization in wireless networks has gained a lot of interest; especially after some of the most interesting positioning application areas have emerged in wireless co...
Mussa Bshara, Leo Van Biesen
CJ
2004
99views more  CJ 2004»
13 years 9 months ago
On the Connectivity of Ad Hoc Networks
We study the effects of physical layer parameters on the connectivity of fading wireless ad-hoc networks. Relying on a symbol error rate connectivity metric for wireless ad-hoc net...
Christian Bettstetter
RAS
2007
161views more  RAS 2007»
13 years 8 months ago
Multi-robot mobility enhanced hop-count based localization in ad hoc networks
The localization problem is important in mobile robots and wireless sensor network and has been studied for many years. Among many localization methods, the hop-count based approa...
Terence Chung Hsin Sit, Zheng Liu, Marcelo H. Ang ...