Sciweavers

2189 search results - page 392 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
CASES
2006
ACM
15 years 5 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
TRIDENTCOM
2008
IEEE
15 years 6 months ago
DRIVE: a reconfigurable testbed for advanced vehicular services and communications
This paper introduces DRIVE, a reconfigurable demonstrator that will allow for experimental validation of vehicular networking research, as well as proof of concept and realistic ...
Carolina Pinart, Pilar Sanz, Iván Lequerica...
RTCSA
2005
IEEE
15 years 5 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
MOBIHOC
2008
ACM
15 years 11 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
PEWASUN
2004
ACM
15 years 5 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...