Localizing tiny sensor nodes in large wireless sensor networks is extremely complex, due to the node’s strict resource limitations regarding memory size, processor performance a...
Frank Reichenbach, Dominik Lieckfeldt, Dirk Timmer...
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
The increasing demand for more bandwidth and the increased application variety fuel the need for high performance network processors. A simple but highly repetitive task performed...
— Wireless sensor networks (WSNs) can be used to record and store audio data at remote and inaccessible places. However, audio data adds an additional concern to the design of th...
Network administration is a task that requires experience in relating symptoms of network problems with possible causes and corrective actions. We describe the design of a system ...
Ashley George, Adetokunbo Makanju, A. Nur Zincir-H...
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB al...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
Micro-mobility protocols aim to improve localized mobility by reducing the handover overheads. In this paper we present the Mobility Plane Architecture (MPA). This architecture wa...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...