Sciweavers

1388 search results - page 170 / 278
» Approximability of Robust Network Design
Sort
View
MOBIWAC
2006
ACM
15 years 6 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
95
Voted
NOSSDAV
2004
Springer
15 years 6 months ago
A framework for architecting peer-to-peer receiver-driven overlays
This paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiverdriven Overlay (or PRO). PRO is designed for non-interactive...
Reza Rejaie, Shad Stafford
GLOBECOM
2008
IEEE
15 years 7 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
LION
2007
Springer
113views Optimization» more  LION 2007»
15 years 6 months ago
Limited-Memory Techniques for Sensor Placement in Water Distribution Networks
Abstract. The practical utility of optimization technologies is often impacted by factors that reflect how these tools are used in practice, including whether various real-world c...
William E. Hart, Jonathan W. Berry, Erik G. Boman,...
83
Voted
ICCTA
2007
IEEE
15 years 7 months ago
On the Link Excess Life in Mobile Wireless Networks
In this paper, one of the most important parameters in performance evaluation and protocol design of wireless networks, Link Excess Life (LEL), is investigated. An analytical mode...
Abbas Nayebi, A. Khosravi, Hamid Sarbazi-Azad