Sciweavers

3426 search results - page 541 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
175
Voted
OPODIS
2004
15 years 4 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
130
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Modified Beacon-Enabled IEEE 802.15.4 MAC for Lower Latency
Industrial sensing, monitoring and automation offer a lucrative application domain for networking and communications. Wired sensor networks have traditionally been used for these ...
G. Bhatti, A. Mehta, Zafer Sahinoglu, J. Zhang, R....
128
Voted
ROBOCOMM
2007
IEEE
15 years 9 months ago
Shared memories: a trail-based coordination server for robot teams
Abstract—Robust, dependable and concise coordination between members of a robot team is a critical ingredient of any such collective activity. Depending on the availability and t...
George Roussos, Dikaios Papadogkonas, J. Taylor, D...
152
Voted
SENSYS
2003
ACM
15 years 8 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
122
Voted
JCM
2007
177views more  JCM 2007»
15 years 3 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume