Sciweavers

669 search results - page 132 / 134
» Constructing minimum energy mobile wireless networks
Sort
View
93
Voted
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
ISMAR
2006
IEEE
15 years 3 months ago
Implementation of god-like interaction techniques for supporting collaboration between outdoor AR and indoor tabletop users
This paper presents a new interaction metaphor we have termed “god-like interaction”. This is a metaphor for improved communication of situational and navigational information...
Aaron Stafford, Wayne Piekarski, Bruce H. Thomas
WAC
2005
Springer
137views Communications» more  WAC 2005»
15 years 3 months ago
Towards Self-optimizing Protocol Stack for Autonomic Communication: Initial Experience
Abstract. The Internet is facing ever-increasing complexity in the construction, configuration and management of heterogeneous networks. New communication paradigms are underminin...
Xiaoyuan Gu, Xiaoming Fu, Hannes Tschofenig, Lars ...
IANDC
2008
92views more  IANDC 2008»
14 years 9 months ago
Tree exploration with advice
We study the amount of knowledge about the network that is required in order to efficiently solve a task concerning this network. The impact of available information on the effici...
Pierre Fraigniaud, David Ilcinkas, Andrzej Pelc
94
Voted
CONEXT
2009
ACM
14 years 10 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...