Sciweavers

314 search results - page 33 / 63
» Network Design Subject to Facility Location
Sort
View
WS
2006
ACM
15 years 5 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
IWCMC
2006
ACM
15 years 5 months ago
Wireless symbolic positioning using support vector machines
This paper introduces a novel symbolic positioning system based on wireless access points and Support Vector Machines. The system works both indoors and outdoors and is cost-effec...
C. Philipp Schloter, Hamid K. Aghajan
MOBICOM
2005
ACM
15 years 5 months ago
Using mobile relays to prolong the lifetime of wireless sensor networks
In this paper we investigate the benefits of a heterogeneous architecture for wireless sensor networks composed of a few resource rich mobile nodes and a large number of simple s...
Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua
WS
2004
ACM
15 years 5 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
FDG
2009
ACM
15 years 6 months ago
Exertion in networked games
Physical play familiar from sports activities is a favorite pastime across all cultures and has been attributed with many social, mental and physical health benefits. However, the...
Florian Mueller