Sciweavers

2189 search results - page 387 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Cooperative mobile network localization via subspace tracking
Two novel cooperative localization algorithms for mobile wireless networks are proposed. To continuously localize the mobile network, given the pairwise distance measurements betw...
Hadi Jamali Rad, Alon Amar, Geert Leus
COMSUR
2011
251views Hardware» more  COMSUR 2011»
13 years 11 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
MOBIHOC
2008
ACM
15 years 11 months ago
Fast and quality-guaranteed data streaming in resource-constrained sensor networks
In many emerging applications, data streams are monitored in a network environment. Due to limited communication bandwidth and other resource constraints, a critical and practical...
Emad Soroush, Kui Wu, Jian Pei
ICN
2007
Springer
15 years 6 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
PERCOM
2008
ACM
15 years 11 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...