Sciweavers

5068 search results - page 782 / 1014
» Basic Computations in Wireless Networks
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
EWSN
2008
Springer
16 years 4 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer
CISIS
2010
IEEE
15 years 11 months ago
UbiPAN: A Bluetooth Extended Personal Area Network
—Most mobile devices are now Bluetooth-enabled. This wireless technology makes it possible to transfer files or stream contents between pieces of equipment. The possibly many de...
Jeremie Albert, Tegawende F. Bissyande, Yér...
WCNC
2008
IEEE
15 years 11 months ago
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks
— Vehicular Ad-hoc Networks (VANETs) are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastru...
Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou
130
Voted
WCNC
2008
IEEE
15 years 11 months ago
Locate More Nodes in Under Water Sensor Networks Using Out-of-Range Information
Abstract—The sparse network topology, coupled with the limited availability of reference nodes in Under Water Sensor Network (UWSN), significantly reduces the effectiveness of m...
Hui Ling, Taieb Znati