Sciweavers

736 search results - page 138 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
82
Voted
MOBISYS
2003
ACM
15 years 9 months ago
The Lighthouse Location System for Smart Dust
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
Kay Römer
UIST
2004
ACM
15 years 3 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
SASN
2004
ACM
15 years 3 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
PERCOM
2005
ACM
15 years 9 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon
EWSN
2009
Springer
15 years 10 months ago
Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks
As the number of wireless devices sharing the unlicensed 2.4 GHz ISM band increases, interference is becoming a problem of paramount importance. We experimentally investigate the e...
Jan-Hinrich Hauer, Vlado Handziski, Adam Wolisz