Sciweavers

1306 search results - page 242 / 262
» Localizing Jammers in Wireless Networks
Sort
View
WIOPT
2006
IEEE
15 years 5 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...
94
Voted
DATE
2005
IEEE
143views Hardware» more  DATE 2005»
15 years 5 months ago
galsC: A Language for Event-Driven Embedded Systems
— We introduce galsC, a language designed for programming event-driven embedded systems such as sensor networks. galsC implements the TinyGALS programming model. At the local lev...
Elaine Cheong, Jie Liu
IWCMC
2010
ACM
15 years 4 months ago
An oversampling approach for LoS-ToA estimation in interleaved OFDMA
Line-of-sight (LoS) time-of-arrival (ToA) is one of key parameters for network-based localization techniques. Its estimation accuracy depends on the bandwidth of transmitted signa...
Ziming He, Yi Ma, Rahim Tafazolli, Hongju Liu
ICDCS
1996
IEEE
15 years 3 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
AINA
2010
IEEE
15 years 3 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores