Sciweavers

MOBIHOC
2008
ACM
15 years 6 days ago
Finding popular categories for RFID tags
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we c...
Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao
MOBIHOC
2008
ACM
15 years 6 days ago
Connectivity in cooperative wireless ad hoc networks
Liaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald ...
MOBIHOC
2008
ACM
15 years 6 days ago
Cooperative transmit-power estimation under wireless fading
We study blind estimation of transmission power of a node based on received power measurements obtained under wireless fading. Specifically, the setup consists of a set of monitor...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
MOBIHOC
2008
ACM
15 years 6 days ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
MOBIHOC
2008
ACM
15 years 6 days ago
Delay-bounded routing in vehicular ad-hoc networks
Ad hoc networks formed by traveling vehicles are envisaged to become a common platform that will support a wide variety of applications, ranging from road safety to advertising an...
Antonios Skordylis, Niki Trigoni
MOBIHOC
2008
ACM
15 years 6 days ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
MOBIHOC
2008
ACM
15 years 6 days ago
Hidden information and actions in multi-hop wireless ad hoc networks
Xiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen, Mo...