Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
— We introduce an algorithm which detects and traces a specified level set of a scalar field (a contour) on a plane. A network of static sensor nodes with limited communication...
This paper concentrates on characterizing energy, latency and capacity trade-offs in multi-hop wireless ad-hoc networks. Therefore, a multiobjective framework is proposed to derive...
Jean-Marie Gorce, Ruifeng Zhang, Katia Jaffr&egrav...
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...