-
1
-
-
71549167595
-
Localization in Wireless Ad-hoc Sensor Networks using Multilateration with RSSI for Logistic Applications
-
X. Wang, O. Bischoff, R. Laur, and S. Paul, "Localization in Wireless Ad-hoc Sensor Networks using Multilateration with RSSI for Logistic Applications," Procedia Chemistry, vol. 1, pp. 461-464, 2009.
-
(2009)
Procedia Chemistry
, vol.1
, pp. 461-464
-
-
Wang, X.1
Bischoff, O.2
Laur, R.3
Paul, S.4
-
2
-
-
14644436970
-
Statistical learning theory for location fingerprinting in wireless LANs
-
DOI 10.1016/j.comnet.2004.09.004, PII S1389128604002610
-
M. Brunato and R. Battiti, "Statistical learning theory for location fingerprinting in wireless LANs," Computer Networks, vol. 47, pp. 825-845, 2005. (Pubitemid 40308680)
-
(2005)
Computer Networks
, vol.47
, Issue.6
, pp. 825-845
-
-
Brunato, M.1
Battiti, R.2
-
3
-
-
0012063711
-
A statistical modeling approach to location estimation
-
DOI 10.1109/TMC.2002.1011059
-
T. Roos, P. Myllymaki, and H. Tirri, "A statistical modeling approach to location estimation," IEEE Transactions on Mobile Computing, pp. 59-69, 2002. (Pubitemid 44357754)
-
(2002)
IEEE Transactions on Mobile Computing
, vol.1
, Issue.1
, pp. 59-69
-
-
Roos, T.1
Myllymaki, P.2
Tirri, H.3
-
4
-
-
78649688335
-
Wlan location determination via clustering and probability distributions
-
M. Youssef, A. Agrawala, and A. Shankar, "Wlan location determination via clustering and probability distributions," in PerCom 2003,pp. 143 - 150.
-
(2003)
PerCom
, pp. 143-150
-
-
Youssef, M.1
Agrawala, A.2
Shankar, A.3
-
6
-
-
80051618580
-
See Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks
-
J. Wilson and N. Patwari, "See Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks,"IEEE Transactions on Mobile Computing, 2010.
-
(2010)
IEEE Transactions on Mobile Computing
-
-
Wilson, J.1
Patwari, N.2
-
7
-
-
33746084519
-
The robustness of localization algorithms to signal strength attacks: A comparative study
-
Y. Chen, K. Kleisouris, X. Li, W. Trappe, and R. Martin, "The robustness of localization algorithms to signal strength attacks: a comparative study," Distributed Computing in Sensor Systems, pp. 546-563, 2006.
-
(2006)
Distributed Computing in Sensor Systems
, pp. 546-563
-
-
Chen, Y.1
Kleisouris, K.2
Li, X.3
Trappe, W.4
Martin, R.5
-
8
-
-
33845335808
-
Transmission power measurements for wireless sensor nodes and their relationship to the battery level
-
S. Blom, C. Bellettini, A. Sinigalliesi, L. Stabellini, M. Rossi, and G. Mazzini, "Transmission power measurements for wireless sensor nodes and their relationship to the battery level,"in 2nd International Symposium on Wireless Communication Systems, pp. 342-345, 2005.
-
(2005)
2nd International Symposium on Wireless Communication Systems
, pp. 342-345
-
-
Blom, S.1
Bellettini, C.2
Sinigalliesi, A.3
Stabellini, L.4
Rossi, M.5
Mazzini, G.6
-
9
-
-
84927728895
-
On power control for wireless sensor networks: System model, middleware component and experimental evaluation
-
B. Z. Ares, P. G. Park, C. Fischione, A. Speranzon, and K. H. Johansson, "On power control for wireless sensor networks: System model, middleware component and experimental evaluation,"in European Control Conference, 2007.
-
European Control Conference, 2007
-
-
Ares, B.Z.1
Park, P.G.2
Fischione, C.3
Speranzon, A.4
Johansson, K.H.5
-
12
-
-
34248339107
-
Modeling adaptive node capture attacks in multi-hop wireless networks
-
DOI 10.1016/j.adhoc.2007.01.002, PII S1570870507000133, Wireless Mesh Networks
-
P. Tague and R. Poovendran, "Modeling adaptive node capture attacks in multi-hop wireless networks," Ad Hoc Netw., vol. 5, pp. 801-814, August 2007. (Pubitemid 46729710)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
13
-
-
2442549672
-
Seken (secure and efficient key exchange for sensor networks)
-
K. Jamshaid and L. Schwiebert, "Seken (secure and efficient key exchange for sensor networks)," in IEEE International Conference on Performance, Computing, and Communications, 2004, pp. 415-422.
-
IEEE International Conference on Performance, Computing, and Communications, 2004
, pp. 415-422
-
-
Jamshaid, K.1
Schwiebert, L.2
-
14
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, january 2003, pp. 342 - 346.
-
Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, January 2003
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
17
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
IEEE Press
-
L. Lazos, R. Poovendran, and S. Čapkun, "ROPE: robust position estimation in wireless sensor networks," in Proceedings of the 4th international symposium on Information processing in sensor networks. IEEE Press, 2005, p. 43.
-
(2005)
Proceedings of the 4th International Symposium on Information Processing in Sensor Networks
, pp. 43
-
-
Lazos, L.1
Poovendran, R.2
Čapkun, S.3
-
19
-
-
33144475948
-
HiRLoc: High-resolution robust localization for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861381
-
L. Lazos and R. Poovendran, "HiRLoc: High-resolution robust localization for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 233-246, 2006. (Pubitemid 43269746)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
20
-
-
34548359279
-
Attack detection in wireless localization
-
Y. Chen, W. Trappe, and R. Martin, "Attack detection in wireless localization," in INFOCOM 2007.
-
(2007)
INFOCOM
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
|