Sciweavers

523 search results - page 76 / 105
» A simulation model for military deployment
Sort
View
113
Voted
ICON
2007
IEEE
15 years 6 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
MOBISYS
2008
ACM
16 years 2 days ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
95
Voted
MSWIM
2005
ACM
15 years 6 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
ICC
2009
IEEE
117views Communications» more  ICC 2009»
15 years 7 months ago
Reduced-Rank Adaptive Least Bit Error-Rate Detection in Hybrid Direct-Sequence Time-Hopping Ultrawide Bandwidth Systems
— In this paper we consider the low-complexity detection in hybrid direct-sequence time-hopping ultrawide bandwidth (DS-TH UWB) systems. A reduced-rank adaptive LBER detector is ...
Qasim Zeeshan Ahmed, Lie-Liang Yang, Sheng Chen
89
Voted
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 7 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang