Sciweavers

Share
MOBIHOC
2005
ACM
9 years 5 months ago
'Openness' and the public airwaves
Sascha D. Meinrath, Victor Bahl, Kenneth R. Carter...
MOBIHOC
2005
ACM
9 years 11 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
MOBIHOC
2005
ACM
9 years 11 months ago
Reliable bursty convergecast in wireless sensor networks
We address the challenges of bursty convergecast in multi-hop wireless sensor networks, where a large burst of packets from different locations needs to be transported reliably an...
Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed...
MOBIHOC
2005
ACM
9 years 11 months ago
Link-layer salvaging for making routing progress in mobile ad hoc networks
IEEE 802.11 MAC, called the Distributed Coordination Function (DCF), employs carrier sensing to effectively avoid collisions, but this makes it difficult to maximally reuse the sp...
Chansu Yu, Kang G. Shin, Lubo Song
MOBIHOC
2005
ACM
9 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
MOBIHOC
2005
ACM
9 years 11 months ago
Inducing spatial clustering in MAC contention for spread spectrum ad hoc networks
This paper proposes a new principle for designing MAC protocols for spread spectrum based ad hoc networks ? inducing spatial clustering in contending transmitters/receivers. We fi...
Xiangying Yang, Gustavo de Veciana
MOBIHOC
2005
ACM
9 years 11 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
MOBIHOC
2005
ACM
9 years 11 months ago
Minimum power configuration in wireless sensor networks
Guoliang Xing, Chenyang Lu, Ying Zhang, Qingfeng H...
MOBIHOC
2005
ACM
9 years 11 months ago
Distributed low-cost backbone formation for wireless ad hoc networks
Yu Wang 0003, Weizhao Wang, Xiang-Yang Li
MOBIHOC
2005
ACM
9 years 11 months ago
Easily-managed and topology-independent location service for self-organizing networks
Aline Carneiro Viana, Marcelo Dias de Amorim, Serg...
books