Sciweavers

9401 search results - page 1868 / 1881
» Wireless Networks
Sort
View
130
Voted
JPDC
2007
112views more  JPDC 2007»
15 years 3 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
154
Voted
CCCG
2010
15 years 1 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
142
Voted
JDCTA
2010
119views more  JDCTA 2010»
14 years 10 months ago
Distributed Dual Cluster Algorithm Based on Grid for Sensor Streams
In practical applications, Wireless Sensor Networks generate massive data streams with the dual attributes in geography and optimization domain. Energy source of sensor nodes in W...
Jianghua Huang, Junying Zhang
172
Voted
TWC
2010
14 years 10 months ago
Distributed consensus-based demodulation: algorithms and error analysis
This paper deals with distributed demodulation of space-time transmissions of a common message from a multiantenna access point (AP) to a wireless sensor network. Based on local me...
Hao Zhu, Alfonso Cano, Georgios B. Giannakis
129
Voted
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
Delay Analysis of Distributed Reservation Protocol with UWB Shadowing Channel for WPAN
— Ultra-wideband (UWB) technology is expected to provide high data rate services for future wireless personal area networks (WPANs). The WiMedia Alliance recently has launched it...
Kuang-Hao Liu, Xuemin Shen, Ruonan Zhang, Lin Cai
« Prev « First page 1868 / 1881 Last » Next »