Sciweavers

551 search results - page 110 / 111
» On the feasibility of receive collaboration in wireless sens...
Sort
View
GLOBECOM
2007
IEEE
13 years 11 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
IPPS
2010
IEEE
13 years 3 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
PODC
2009
ACM
14 years 5 months ago
Oblivious interference scheduling
In the interference scheduling problem, one is given a set of n communication requests described by pairs of points from a metric space. The points correspond to devices in a wire...
Alexander Fanghänel, Berthold Vöcking, H...
TCOM
2010
117views more  TCOM 2010»
13 years 3 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
HIPC
2003
Springer
13 years 10 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...