Sciweavers

291 search results - page 48 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
92
Voted
IPSN
2005
Springer
15 years 7 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
INFOCOM
2012
IEEE
13 years 4 months ago
Submodular game for distributed application allocation in shared sensor networks
Abstract—Wireless sensor networks are evolving from singleapplication platforms towards an integrated infrastructure shared by multiple applications. Given the resource constrain...
Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu
ACMACE
2009
ACM
15 years 3 months ago
Developing multiplayer pervasive games and networked interactive installations using ad hoc mobile sensor nets
We here present Fun in Numbers (FinN), a framework for developing pervasive applications and interactive installations for entertainment and educational purposes. Using ad hoc mob...
Orestis Akribopoulos, Marios Logaras, Nikos Vasila...
IWIA
2005
IEEE
15 years 7 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
JSAC
2007
153views more  JSAC 2007»
15 years 1 months ago
Cooperative Relay Service in a Wireless LAN
As a family of wireless local area network (WLAN) protocols between physical layer and higher layer protocols, IEEE 802.11 has to accommodate the features and requirements of both...
Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Song...