Sciweavers

50 search results - page 5 / 10
» icwn 2007
Sort
View
ICWN
2004
13 years 9 months ago
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks
Abstract-- In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to t...
Rohan Sen, Radu Handorean, Gregory Hackmann, Gruia...
ICWN
2003
13 years 9 months ago
An Indoor Bluetooth-Based Positioning System: Concept, Implementation and Experimental Evaluation
This paper presents the experimental evaluation of a Bluetooth-based positioning system. The method has been implemented in a Bluetooth-capable handheld device. Empirical tests of...
Silke Feldmann, Kyandoghere Kyamakya, Ana Zapater,...
ICWN
2003
13 years 9 months ago
The Effect of Disengaging RTS/CTS Dialogue in IEEE 802.11 MAC Protocol
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...
Laura Huei-jiun Ju, Izhak Rubin
ICWN
2003
13 years 9 months ago
Localization in Wireless Sensor Networks: A Probabilistic Approach
— In this paper we consider a probabilistic approach to the problem of localization in wireless sensor networks and propose a distributed algorithm that helps unknown nodes to de...
Vaidyanathan Ramadurai, Mihail L. Sichitiu
ICWN
2003
13 years 9 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...