-
1
-
-
33847396877
-
Skeleton pruning by contour partitioning with discrete curve evolution
-
X. Bai, L.J. Latecki and W.-Y. Liu, Skeleton pruning by contour partitioning with discrete curve evolution, in: IEEE Trans Pattern Anal Mach Intell (2007), 449-462.
-
(2007)
IEEE Trans Pattern Anal Mach Intell
, pp. 449-462
-
-
Bai, X.1
Latecki, L.J.2
Liu, W.-Y.3
-
2
-
-
77954553948
-
Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps
-
April
-
Z. Bankovíc, J.M. Moya, A. Araujo, D. Fraga, J.C. Vallejo and J.-M. de Goyeneche, Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps, Integr Comput- Aided Eng 17(2) (April 2010), 87-102.
-
(2010)
Integr Comput- Aided Eng
, vol.17
, Issue.2
, pp. 87-102
-
-
Bankovíc, Z.1
Moya, J.M.2
Araujo, A.3
Fraga, D.4
Vallejo, J.C.5
De Goyeneche, J.-M.6
-
7
-
-
51349125793
-
Dynamic jamming mitigation for wireless broadcast networks
-
J.T. Chiang and Y.-C. Hu, Dynamic jamming mitigation for wireless broadcast networks, in: IEEE Infocom, (2008).
-
(2008)
IEEE Infocom
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
8
-
-
0004116989
-
-
McGraw-Hill Higher Education, 2nd edition
-
T.H. Cormen, C. Stein, R.L. Rivest and C.E. Leiserson, Introduction to algorithms, McGraw-Hill Higher Education, 2nd edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Stein, C.2
Rivest, R.L.3
Leiserson, C.E.4
-
11
-
-
84863713821
-
Antenna selection in polarized multiple input multiple output transmissions with mutual coupling
-
A. Habib and M. Rupp, Antenna selection in polarized multiple input multiple output transmissions with mutual coupling, Integrated Computer-Aided Engineering (2012), 299-312.
-
(2012)
Integrated Computer-Aided Engineering
, pp. 299-312
-
-
Habib, A.1
Rupp, M.2
-
13
-
-
84860153991
-
Network management framework and lifetime evaluation method for wireless sensor networks
-
J. Kim, H. Jeon and J. Lee, Network management framework and lifetime evaluation method for wireless sensor networks, Integrated Computer-Aided Engineering (2012), 165-178.
-
(2012)
Integrated Computer-Aided Engineering
, pp. 165-178
-
-
Kim, J.1
Jeon, H.2
Lee, J.3
-
15
-
-
80051886131
-
Localizing multiple jamming attackers in wireless networks
-
H. Liu, Z. Liu, Y. Chen and W. Xu, Localizing multiple jamming attackers in wireless networks, in: ICDCS'11: Proceedings of Int'l Conference on Distributed Computing Systems (2011), 517-528.
-
(2011)
ICDCS'11: Proceedings of Int'l Conference on Distributed Computing Systems
, pp. 517-528
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
16
-
-
70349334200
-
Localizing jammers in wireless networks, in: Percom'09
-
H. Liu, W. Xu, Y. Chen and Z. Liu, Localizing jammers in wireless networks, in: PERCOM'09: Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications (2009), 1-6.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
, pp. 1-6
-
-
Liu, H.1
Xu, W.2
Chen, Y.3
Liu, Z.4
-
18
-
-
77955405219
-
Wireless jamming localization by exploiting nodes' hearing ranges
-
Z. Liu, H. Liu, W. Xu and Y. Chen, Wireless jamming localization by exploiting nodes' hearing ranges, in: DCOSS'10: Proceedings of the International Conference on Distributed Computing in Sensor System (2010), 348-361.
-
(2010)
DCOSS'10: Proceedings of the International Conference on Distributed Computing in Sensor System
, pp. 348-361
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
19
-
-
34247885928
-
Wireless sensor network localization techniques
-
G. Mao, B. Fidan and B.D.O. Anderson, Wireless sensor network localization techniques, in: Comput Netw 51 (2007), 2529-2553.
-
(2007)
Comput Netw
, vol.51
, pp. 2529-2553
-
-
Mao, G.1
Fidan, B.2
Anderson, B.D.O.3
-
20
-
-
77951710463
-
Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system
-
S. Misra, R. Singh and S.V.R. Mohan, Information warfareworthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system, in: Sensors 10 (2010), 3444-3479.
-
(2010)
Sensors
, vol.10
, pp. 3444-3479
-
-
Misra, S.1
Singh, R.2
Mohan, S.V.R.3
-
21
-
-
67749114527
-
An effective defensive node against jamming attacks in sensor networks
-
A. Mpitziopoulos and D. Gavalas, An effective defensive node against jamming attacks in sensor networks, in: Security and Communication Networks 2 (2009), 145-163.
-
(2009)
Security and Communication Networks
, vol.2
, pp. 145-163
-
-
Mpitziopoulos, A.1
Gavalas, D.2
-
23
-
-
0017453547
-
Convex hulls of finite sets of points in two and three dimensions
-
F.P. Preparata and S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, in: Commun ACM (1977).
-
(1977)
Commun ACM
-
-
Preparata, F.P.1
Hong, S.J.2
-
24
-
-
84867545961
-
An efficient gpu implementation of fixed-complexity sphere decoders for mimo wireless systems
-
S. Roger, C. Ramiro, A. Gonzalez, V. Almenar and A. Vidal, An efficient gpu implementation of fixed-complexity sphere decoders for mimo wireless systems, Integrated Computer- Aided Engineering (2012), 341-350.
-
(2012)
Integrated Computer- Aided Engineering
, pp. 341-350
-
-
Roger, S.1
Ramiro, C.2
Gonzalez, A.3
Almenar, V.4
Vidal, A.5
-
25
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev and S. Čapkun, Detection of reactive jamming in sensor networks, in: ACM Trans Sen Netw 7 (2010), 16:1-16:29.
-
(2010)
ACM Trans Sen Netw
, vol.7
, pp. 161-1629
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
32
-
-
45749134626
-
Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks
-
A.D. Wood, J.A. Stankovic and G. Zhou, Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks, in: Proceedings of IEEE SECON'07 (2007).
-
(2007)
Proceedings of IEEE SECON'07
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
34
-
-
33745062882
-
Jamming sensor networks: Attacks and defense strategies
-
W. Xu, K. Ma, W. Trappe and Y. Zhang, Jamming sensor networks: Attacks and defense strategies, in: IEEE Network, (2006).
-
(2006)
IEEE Network
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
|