default search action
MASS 2012: Las Vegas, NV, USA - Supplement Volume / Workshops
- 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume / Workshops. IEEE Computer Society 2012
- Joseph Soryal, Tarek N. Saadawi:
Byzantine Attack Isolation in IEEE 802.11 Wireless Ad-Hoc Networks. 1-5 - Chafika Benzaid, Sana Medjadba, Nadjib Badache:
Fast verification of an ID-based signature scheme for broadcast authentication inwireless sensor networks. 1-6 - Orestis Evangelatos, Kasun Samarasinghe, José D. P. Rolim:
Evaluating design approaches for smart building systems. 1-7 - A. Dominik Haumann, Maximilian Löffler, Volker Willert:
Distributed kalman filtering for noisy consensus networks with time delays. 1-6 - Xiao Wang, Renjian Feng, Yinfeng Wu, Shenyun Che, Yongji Ren:
A game theoretic malicious nodes detection model in MANETs. 1-6 - Andrea Gasparri, Gabriele Oliva, Mauro Franceschelli, Stefano Panzieri:
Online distributed synchronizability check for networks of interconnected systems. 1-6 - Nasser-Eddine Rikli, Mshari Alabdulkarim:
Adaptive video transport over low bit-rate multihop WSNs. 1-5 - Zilong Han, Xiaofeng Wang, Fei Wang, Yongjun Wang:
Collaborative detection of DDoS attacks based on chord protocol. 1-4 - Christian Lerche, Nico Laum, Frank Golatowski, Dirk Timmermann, Christoph Niedermeier:
Connecting the web with the web of things: lessons learned from implementing a CoAP-HTTP proxy. 1-8 - Yuan Lin, Yuanzhi He:
Research on optimal stopping problem based opportunistic channel access. 1-4 - Yasuhisa Takizawa:
Space-free localization for wireless sensor networks based on neighbor topology. 1-6 - Yvonne-Anne Pignolet, Ilias Rinis, Dacfey Dzung, Abdulkadir Karaagaç:
Heterogeneous multi-interface routing: networking stack and simulator extensions. 1-6 - Fei Wang, Xiaofeng Wang, Xiaofeng Hu, Jinshu Su:
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection. 1-4 - Juliane Euler, Andreas Horn, Dominik Haumann, Jürgen Adamy, Oskar von Stryk:
Cooperative n-boundary tracking in large scale environments. 1-6 - Ibrahim Ethem Bagci, Mohammad Reza Pourmirza, Shahid Raza, Utz Roedig, Thiemo Voigt:
Codo: confidential data storage for wireless sensor networks. 1-6 - Vaibhav Pandit, Hailong Li, Venkata Praneeth Varma Gottumukkala, Dharma P. Agrawal:
APCAPT: Asymmetric power control against packet tracer attacks for base station location anonymity. 1-6 - Angelo Paolo Castellani, Thomas Fossati, Salvatore Loreto:
HTTP-CoAP cross protocol proxy: an implementation viewpoint. 1-6 - Ahmed E. El-Din, Rabie A. Ramadan, Magda B. Fayek:
A novel fuzzy HEED security using VEGK for wireless sensor networks. 1-6 - Sanshit Sharma, Vaibhav Pandit, Dharma P. Agrawal:
T-Hex: true hexagonal regular topology formation in large scale wireless sensor networks. 1-6 - Yuan-zhi He, Shu-yi Yin:
In-orbit test method of shaped-reflector antenna on satellites. 1-4 - Chengjun Wang, Zhenghu Gong, Chunqing Wu, Baokang Zhao, Ziwen Zhang:
CRASP: congestion control routing algorithm against selfish behavior based on pigeonhole principle in DTN. 1-6 - Bharat S. Rawal, Ramesh K. Karne, Alexander L. Wijesinha, Harold Ramcharan, Songjie Liang:
A split protocol technique for web server migration. 1-6 - Mohammad Abdelhadi, Muhammad Anan:
A three-dimensional localization algorithm for wireless sensor networks using artificial neural networks. 1-5 - Fabrício B. Carvalho, Elerson Rubens da Silva Santos, Andrea Iabrudi, Luiz Chaimowicz, Mario Fernando Montenegro Campos:
Indoor wireless sensor localization using mobile robot and RSSI. 1-6 - Salimur Choudhury, Kai Salomaa, Selim G. Akl:
Cellular automaton based algorithms for depth adjustment in underwater mobile sensor networks. 1-6 - Dushan Aththidiyavidanalage Don, Vaibhav Pandit, Dharma P. Agrawal:
Hierarchical group key management for wireless mesh networks using multivariate symmetric polynomials. 1-6 - Giovani Rimon Abuaitah, Bin Wang:
Data-centric anomalies in sensor network deployments: analysis and detection. 1-6 - Desheng Fu, Matthias Becker, Sven Schaust, Helena Szczerbicka:
Orthogonal cut algorithm for value-based event localization in sensor networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.