Sciweavers

9401 search results - page 143 / 1881
» Wireless Networks
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 1 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
138
Voted
ICC
2008
IEEE
109views Communications» more  ICC 2008»
15 years 10 months ago
An MDP-Based Approach for Multipath Data Transmission over Wireless Networks
—Maintaining performance and reliability in wireless networks is a challenging task due to the nature of wireless channels. Multipath data transmission has been used in wired sce...
Vinh Bui, Weiping Zhu, Alessio Botta, Antonio Pesc...
ICDCS
2009
IEEE
15 years 1 months ago
Multicast Throughput of Hybrid Wireless Networks Under Gaussian Channel Model
We study the multicast capacity for hybrid wireless networks consisting of ordinary wireless nodes and base stations under Gaussian Channel model, which generalizes both the unica...
Cheng Wang, ShaoJie Tang, Xiang-Yang Li, Changjun ...
SSS
2009
Springer
138views Control Systems» more  SSS 2009»
15 years 10 months ago
Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios
We describe an approach to the analysis of protocols for wireless sensor networks in scenarios with mobile nodes and dynamic link quality. The approach is based on the theorem prov...
Cinzia Bernardeschi, Paolo Masci, Holger Pfeifer
MOBIHOC
2006
ACM
16 years 3 months ago
Fundamental scaling laws for energy-efficient storage and querying in wireless sensor networks
We use a constrained optimization framework to derive fundamental scaling laws for both unstructured sensor networks (which use blind sequential search for querying) and structure...
Joon Ahn, Bhaskar Krishnamachari