Sciweavers

1583 search results - page 59 / 317
» The Quorum Deployment Problem
Sort
View
COMCOM
2006
79views more  COMCOM 2006»
15 years 3 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
ICASSP
2011
IEEE
14 years 7 months ago
Non-centralized target tracking with mobile agents
In this paper we consider the problem of target tracking in a network of mobile agents. We propose a scheme with agents that are endowed with processing and decision-making capabi...
Petar M. Djuric, Jonathan Beaudeau, Mónica ...
TMC
2012
13 years 5 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
123
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 9 months ago
Min-Max Congestion in Interference-Prone Wireless Mesh Networks
— Users’ demand of seamless connectivity has pushed for the development of alternatives to traditional infrastructure networks. Potential solutions should be low-cost, easily d...
Sonia Waharte, Arash Farzan, Raouf Boutaba
108
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen