Sciweavers

1809 search results - page 268 / 362
» Macro-programming Wireless Sensor Networks Using Kairos
Sort
View
120
Voted
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
126
Voted
MOBIHOC
2006
ACM
16 years 3 months ago
DRAND: : distributed randomized TDMA scheduling for wireless ad-hoc networks
This paper presents a distributed implementation of RAND, a randomized time slot scheduling algorithm, called DRAND. DRAND runs in O() time and message complexity where is the max...
Injong Rhee, Ajit Warrier, Jeongki Min, Lisong Xu
WIOPT
2005
IEEE
15 years 9 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
129
Voted
IFIP
2003
Springer
15 years 8 months ago
Collaborative and Distributed Computation in Mesh-Like Wireless Sensor Arrays
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...
Mitali Singh, Viktor K. Prasanna, José D. P...
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 9 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...