Sciweavers

738 search results - page 127 / 148
» Security considerations in ad hoc sensor networks
Sort
View
ESORICS
2010
Springer
14 years 10 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
WCNC
2008
IEEE
15 years 3 months ago
How Much Improvement Can We Get From Partially Overlapped Channels?
—Partially Overlapped Channel (POC) based design, has been identified recently as a promising technique to overcome the capacity bottleneck facing wireless engineers in various ...
Zhenhua Feng, Yaling Yang
WICSA
2004
14 years 10 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
PODC
2005
ACM
15 years 3 months ago
Maximal independent sets in radio networks
We study the distributed complexity of computing a maximal independent set (MIS) in radio networks with completely unknown topology, asynchronous wake-up, and no collision detecti...
Thomas Moscibroda, Roger Wattenhofer
WINET
2010
185views more  WINET 2010»
14 years 7 months ago
TDMA scheduling algorithms for wireless sensor networks
Abstract Algorithms for scheduling TDMA transmissions in multi-hop networks usually determine the smallest length conflict-free assignment of slots in which each link or node is a...
Sinem Coleri Ergen, Pravin Varaiya