Sciweavers

4189 search results - page 728 / 838
» On the Security of Wireless Sensor Networks
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 1 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
ICNSC
2007
IEEE
15 years 4 months ago
Analysis of a Simple Feedback Scheme for Error Correction over a Lossy Network
Abstract— In time varying packet-switched networks, delivering data with high reliability using a limited amount of network resources is highly desirable. To capture the trade-of...
Oscar Flardh, Carlo Fischione, Karl Henrik Johanss...
CORR
2006
Springer
113views Education» more  CORR 2006»
14 years 10 months ago
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
Mikio Fujii
TMC
2012
13 years 11 days ago
Elevator-Assisted Sensor Data Collection for Structural Health Monitoring
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...
PERCOM
2005
ACM
15 years 3 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi