Sciweavers

1808 search results - page 101 / 362
» Locality optimization in wireless applications
Sort
View
INFOCOM
2007
IEEE
15 years 11 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
150
Voted
CD
2005
Springer
15 years 10 months ago
Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks
Abstract. This paper presents a middleware platform we designed in order to allow the deployment of component-based software applications on mobile devices (such as laptops or pers...
Hervé Roussain, Frédéric Guid...
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 8 months ago
Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming Over Wireless Ad-Hoc Networks
Abstract-- Simultaneous support of multiple delay-critical application sessions such as multiuser video streaming require a paradigm shift in the design of ad-hoc wireless networks...
Sachin Adlakha, Xiaoqing Zhu, Bernd Girod, Andrea ...
SENSYS
2004
ACM
15 years 10 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
IJCV
1998
105views more  IJCV 1998»
15 years 4 months ago
Robust Algorithms for Object Localization
Object localization using sensed data features and corresponding model features is a fundamental problem in machine vision. We reformulate object localization as a least squares p...
Aaron S. Wallack, Dinesh Manocha