Sciweavers

5815 search results - page 1045 / 1163
» Self-monitoring for sensor networks
Sort
View
88
Voted
TMC
2008
83views more  TMC 2008»
15 years 19 days ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
115
Voted
IS
2010
14 years 11 months ago
ROC analysis of a fatigue classifier for vehicular drivers
— Few systems have been developed for the detection of fatigue / stress level of a vehicular driver in order to monitor and control the alertness level for preventing road accide...
Mahesh M. Bundele, Rahul Banerjee
101
Voted
PERCOM
2010
ACM
14 years 11 months ago
Towards wearable sensing-based assessment of fluid intake
—Fluid intake is an important information for many health and assisted living applications. At the same time it is inherently difficult to monitor. Existing reliable solutions r...
Oliver Amft, David Bannach, Gerald Pirkl, Matthias...
135
Voted
TCOM
2010
117views more  TCOM 2010»
14 years 11 months ago
Optimal Coding Strategies for Bidirectional Broadcast Channels Under Channel Uncertainty
Bidirectional relaying is a promising approach to improve the performance in wireless networks such as sensor, ad-hoc, and even cellular systems. Bidirectional relaying applies to...
Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. ...
CORR
2010
Springer
177views Education» more  CORR 2010»
14 years 9 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
« Prev « First page 1045 / 1163 Last » Next »