Sciweavers

15 search results - page 1 / 3
» mobihoc 2010
Sort
View
MOBIHOC
2010
ACM
13 years 2 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...
MOBIHOC
2010
ACM
13 years 2 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
MOBIHOC
2010
ACM
13 years 2 months ago
Fine-grained mobility characterization: steady and transient state behaviors
Recent popularization of personal hand-held mobile devices makes it important to characterize the mobility pattern of mobile device users, so as to accurately predict user mobilit...
Wei Gao, Guohong Cao
MOBIHOC
2010
ACM
13 years 2 months ago
Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach
In geographic (or geometric) routing, messages are expected to route in a greedy manner: the current node always forwards a message to its neighbor node that is closest to the des...
Anne-Marie Kermarrec, Guang Tan
MOBIHOC
2010
ACM
13 years 2 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...