Sciweavers

950 search results - page 46 / 190
» presence 2008
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 4 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
WCNC
2008
IEEE
15 years 4 months ago
An Enhanced Routing Metric for Fading Wireless Channels
Abstract— In this paper we propose the enhancement of routing metrics through a more complete view of the physical channel. Using cross-layer optimizations, we develop the Distri...
Daniel de Oliveira Cunha, Otto Carlos M. Duarte, G...
AIPS
2008
15 years 1 days ago
The Complexity of Optimal Planning and a More Efficient Method for Finding Solutions
We present a faster method of solving optimal planning problems and show that our solution performs up to an order of magnitude faster than Satplan on a variety of problems from t...
Katrina Ray, Matthew L. Ginsberg
ATAL
2008
Springer
14 years 11 months ago
The effects of market-making on price dynamics
This paper studies price properties in continuous double-auction markets in the presence of marketmakers, agents with special responsibilities for maintaining liquidity and orderl...
Sanmay Das