Sciweavers

291 search results - page 45 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
ICDCS
2009
IEEE
15 years 11 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
15 years 8 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
SIGCOMM
2010
ACM
15 years 2 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...

Presentation
945views
13 years 7 months ago
A Decentralized Method for Maximizing k-coverage Lifetime in WSNs
In this paper, we propose a decentralized method for maximizing lifetime of data collection wireless sensor networks (WSNs) by making minimal number of nodes operate and putting ot...
ICDCS
2012
IEEE
13 years 4 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...