Sciweavers

1020 search results - page 49 / 204
» Clustering-based location in wireless networks
Sort
View
MOBICOM
2003
ACM
15 years 5 months ago
Geographic routing without location information
For many years, scalable routing for wireless communication systems was a compelling but elusive goal. Recently, several routing algorithms that exploit geographic information (e....
Ananth Rao, Christos H. Papadimitriou, Scott Shenk...
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 11 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
OPODIS
2004
15 years 1 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
ICCCN
2008
IEEE
15 years 6 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...
PERCOM
2006
ACM
15 years 11 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...