Sciweavers

437 search results - page 60 / 88
» Clock Synchronization for Wireless Networks
Sort
View
99
Voted
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
15 years 2 days ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
92
Voted
IPPS
2007
IEEE
15 years 6 months ago
Using Coroutines for RPC in Sensor Networks
This paper proposes a concurrency model which integrates the asynchronous and event-driven nature of wireless etworks with higher-level abstractions that provide a more familiar p...
Marcelo Cohen, Thiago Ponte, Silvana Rossetto, Noe...
95
Voted
EWSN
2004
Springer
16 years 1 days ago
Tracking Real-World Phenomena with Smart Dust
Abstract. So-called "Smart Dust" is envisioned to combine sensing, computing, and wireless communication capabilities in an autonomous, dust-grain-sized device. Dense net...
Kay Römer
111
Voted
SAC
2003
ACM
15 years 5 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
97
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana