Sciweavers

ICDCN
2011
Springer
13 years 3 months ago
Deterministic Dominating Set Construction in Networks with Bounded Degree
This paper considers the problem of calculating dominating sets in networks with bounded degree. In these networks, the maximal degree of any node is bounded by Δ, which is usuall...
Roy Friedman, Alex Kogan
ICASSP
2011
IEEE
13 years 3 months ago
Basis Pursuit in sensor networks
Basis Pursuit (BP) finds a minimum ℓ1-norm vector z that satisfies the underdetermined linear system Mz = b, where the matrix M and vector b are given. Lately, BP has attracte...
João F. C. Mota, João M. F. Xavier, ...
ICASSP
2011
IEEE
13 years 3 months ago
Distributed LCMV beamforming in wireless sensor networks with node-specific desired signals
We consider distributed linearly constrained minimum variance (LCMV) beamforming in a wireless sensor network. Each node computes an LCMV beamformer with node-specific constraint...
Alexander Bertrand, Marc Moonen
TWC
2010
13 years 6 months ago
Distributed Node Selection for Sequential Estimation over Noisy Communication Channels
This paper proposes a framework for distributed sequential parameter estimation in wireless sensor networks. In the proposed scheme, the estimator is updated sequentially at the c...
Thakshila Wimalajeewa, Sudharman K. Jayaweera
TSP
2010
13 years 6 months ago
Optimization and analysis of distributed averaging with short node memory
Distributed averaging describes a class of network algorithms for the decentralized computation of aggregate statistics. Initially, each node has a scalar data value, and the goal...
Boris N. Oreshkin, Mark Coates, Michael G. Rabbat
TON
2010
196views more  TON 2010»
13 years 6 months ago
Fast Recovery From Dual-Link or Single-Node Failures in IP Networks Using Tunneling
Abstract--This paper develops novel mechanisms for recovering from failures in IP networks with proactive backup path calculations and IP tunneling. The primary scheme provides res...
Shrinivasa Kini, S. Ramasubramanian, Amund Kvalbei...
TII
2010
108views Education» more  TII 2010»
13 years 6 months ago
Retransmission Strategies for Cyclic Polling over Wireless Channels in the Presence of Interference
In this paper we consider retransmission strategies for centralized cyclic polling-based systems over wireless channels subject to external interference. The considered strategies...
Giovanni Gamba, Federico Tramarin, Andreas Willig
TDSC
2010
157views more  TDSC 2010»
13 years 6 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
NHM
2010
101views more  NHM 2010»
13 years 6 months ago
Stars of vibrating strings: Switching boundary feedback stabilization
We consider a star-shaped network consisting of a single node with N 3 connected arcs. The dynamics on each arc is governed by the wave equation. The arcs are coupled at the node ...
Martin Gugat, Mario Sigalotti
MOBILIGHT
2010
13 years 6 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...