Sciweavers

385 search results - page 67 / 77
» Contour Approximation in Sensor Networks
Sort
View
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
IC
2007
14 years 11 months ago
Gordon Surface Modeling in a Network Environment
—With the advent of the Internet, we have entered the age of ubiquitous systems that will need to be able to communicate, establish criteria for measurement and then perform thes...
Jan Smid, Petr Volf
PERCOM
2005
ACM
15 years 9 months ago
Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to und...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
DCOSS
2006
Springer
15 years 1 months ago
Optimal Placement and Selection of Camera Network Nodes for Target Localization
The paper studies the optimal placement of multiple cameras and the selection of the best subset of cameras for single target localization in the framework of sensor networks. The ...
Ali Ozer Ercan, Danny B. Yang, Abbas El Gamal, Leo...
CDC
2009
IEEE
103views Control Systems» more  CDC 2009»
15 years 2 months ago
Reduced-order predictive outage compensators for networked systems
Abstract— Control systems utilizing wireless sensor and actuator networks can be severely affected by the properties of the wireless links. Radio fading and interference may caus...
Erik Henriksson, Henrik Sandberg, Karl Henrik Joha...