Sciweavers

3887 search results - page 597 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
SASN
2003
ACM
15 years 8 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
113
Voted
SENSYS
2009
ACM
15 years 10 months ago
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson,...
SASN
2006
ACM
15 years 9 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
15 years 5 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis
CVPR
2004
IEEE
16 years 5 months ago
Efficient Tracking with the Bounded Hough Transform
The Bounded Hough Transform is introduced to track objects in a sequence of sparse range images. The method is based upon a variation of the General Hough Transform that exploits ...
Michael A. Greenspan, Limin Shang, Piotr Jasiobedz...