Abstract— We consider the problem of determining the positions of wireless nodes using range measurements from multiple, sparsely located, beacon stations with known locations. A...
Mihail L. Sichitiu, Vaidyanathan Ramadurai, Pushki...
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
In wireless ad hoc sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. Topology management schemes su...
Quang Gao, Keith J. Blow, David J. Holding, Ian W....
—In mobile ad hoc networks, there are many applications in which mobile users share information, e.g., collaborative rescue operations at a disaster site and exchange of word-of-...
As government agencies increasingly collaborate with international counterparts on critical global issues, transnational knowledge and information sharing grow in importance. This...
Sharon S. Dawes, Mohammed A. Gharawi, G. Brian Bur...