Sciweavers

2268 search results - page 453 / 454
» Modeling wireless shadow networks
Sort
View
MOBICOM
2010
ACM
13 years 6 months ago
Indoor localization without the pain
While WiFi-based indoor localization is attractive, the need for a significant degree of pre-deployment effort is a key challenge. In this paper, we ask the question: can we perfo...
Krishna Chintalapudi, Anand Padmanabha Iyer, Venka...
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 5 months ago
Competition with Dynamic Spectrum Leasing
Dynamic spectrum leasing can greatly enhance the spectrum efficiency and encourage more flexible services in the spectrum market. This paper presents a detailed analytical study of...
Lingjie Duan, Jianwei Huang, Biying Shou
JSAC
2008
125views more  JSAC 2008»
13 years 5 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
TMC
2010
158views more  TMC 2010»
13 years 4 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
CCCG
2010
13 years 3 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick