Sciweavers

Share
MOBIHOC
2008
ACM
10 years 9 months ago
Finding popular categories for RFID tags
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we c...
Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao
MOBIHOC
2008
ACM
10 years 9 months ago
Connectivity in cooperative wireless ad hoc networks
Liaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald ...
MOBIHOC
2008
ACM
10 years 9 months ago
Cooperative transmit-power estimation under wireless fading
We study blind estimation of transmission power of a node based on received power measurements obtained under wireless fading. Specifically, the setup consists of a set of monitor...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
MOBIHOC
2008
ACM
10 years 9 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
MOBIHOC
2008
ACM
10 years 9 months ago
Delay-bounded routing in vehicular ad-hoc networks
Ad hoc networks formed by traveling vehicles are envisaged to become a common platform that will support a wide variety of applications, ranging from road safety to advertising an...
Antonios Skordylis, Niki Trigoni
MOBIHOC
2008
ACM
10 years 9 months ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
MOBIHOC
2008
ACM
10 years 9 months ago
Hidden information and actions in multi-hop wireless ad hoc networks
Xiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen, Mo...
MOBIHOC
2008
ACM
10 years 9 months ago
Optimal relay assignment for cooperative communications
Recently, cooperative communications, in the form of keeping each node with a single antenna and having a node exploit a relay node's antenna, is shown to be a promising appr...
Yi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Komp...
books