Sciweavers

889 search results - page 97 / 178
» The Design and Implementation of a Wireless Video Surveillan...
Sort
View
ESORICS
2009
Springer
15 years 7 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
82
Voted
IWCMC
2010
ACM
15 years 5 months ago
Turbo packet combining techniques for multi-relay-assisted systems over multi-antenna broadband channels
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
Houda Chafnaji, Halim Yanikomeroglu, Tarik Ait-Idi...
138
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 7 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
111
Voted
HPCS
2006
IEEE
15 years 6 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
109
Voted
ALGOSENSORS
2007
Springer
15 years 2 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...