Sciweavers

MOBIHOC
2010
ACM
13 years 6 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...
MOBIHOC
2010
ACM
13 years 6 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
MOBIHOC
2010
ACM
13 years 6 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
MOBIHOC
2010
ACM
13 years 6 months ago
Near optimal multi-application allocation in shared sensor networks
Recent years have witnessed the emergence of shared sensor networks as integrated infrastructure for multiple applications. It is important to allocate multiple applications in a ...
You Xu, Abusayeed Saifullah, Yixin Chen, Chenyang ...
MOBIHOC
2010
ACM
13 years 6 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
MOBIHOC
2010
ACM
13 years 6 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang
MOBIHOC
2010
ACM
13 years 6 months ago
Fine-grained mobility characterization: steady and transient state behaviors
Recent popularization of personal hand-held mobile devices makes it important to characterize the mobility pattern of mobile device users, so as to accurately predict user mobilit...
Wei Gao, Guohong Cao
MOBIHOC
2010
ACM
13 years 6 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
IWCMC
2010
ACM
13 years 6 months ago
A dead end avoidance method for geographic forwarding in MANETs
Jian-Ming Chang, Han-Chieh Chao, Jiann-Liang Chen
IWCMC
2010
ACM
13 years 6 months ago
Network mobility support in PMIPv6 network
In this paper, we propose a network mobility supporting scheme (N-NEMO) in Proxy Mobile IPv6 (PMIPv6) network, which is an issue still up in the air for the PMIPv6. In the N-NEMO,...
Zhiwei Yan, Sidong Zhang, Huachun Zhou, Hongke Zha...