callback( { "result":{ "query":":facetid:toc:\"db/conf/secon/secon2007.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.20" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"81", "@dc":"81", "@oc":"81", "@id":"43410653", "text":":facetid:toc:db/conf/secon/secon2007.bht" } }, "hits":{ "@total":"81", "@computed":"81", "@sent":"81", "@first":"0", "hit":[{ "@score":"1", "@id":"5602286", "info":{"authors":{"author":[{"@pid":"91/1764","text":"Robert P. Adler"},{"@pid":"55/2421","text":"Jonathan Huang"},{"@pid":"22/143","text":"Raymond Kong"},{"@pid":"68/3468","text":"Philip Muse"},{"@pid":"65/3345","text":"Lama Nachman"},{"@pid":"33/5622","text":"Rahul C. Shah"},{"@pid":"83/3971","text":"Chieh-Yih Wan"},{"@pid":"00/1863","text":"Mark D. Yarvis"}]},"title":"Edge Processing and Enterprise Integration: Closing the Gap on Deployable Industrial Sensor Networks.","venue":"SECON","pages":"620-630","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/AdlerHKMNSWY07","doi":"10.1109/SAHCN.2007.4292874","ee":"https://doi.org/10.1109/SAHCN.2007.4292874","url":"https://dblp.org/rec/conf/secon/AdlerHKMNSWY07"}, "url":"URL#5602286" }, { "@score":"1", "@id":"5602287", "info":{"authors":{"author":[{"@pid":"33/2496","text":"N. Ahmed"},{"@pid":"91/4189","text":"K. Jamshaid"},{"@pid":"15/6985","text":"O. Z. Khan"}]},"title":"SAFIRE: A Self-Organizing Architecture for Information Exchange between First Responders.","venue":"SECON","pages":"655-661","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/AhmedJK07","doi":"10.1109/SAHCN.2007.4292878","ee":"https://doi.org/10.1109/SAHCN.2007.4292878","url":"https://dblp.org/rec/conf/secon/AhmedJK07"}, "url":"URL#5602287" }, { "@score":"1", "@id":"5602288", "info":{"authors":{"author":[{"@pid":"53/6450-2","text":"Xin Ai 0002"},{"@pid":"42/1769","text":"Vikram Srinivasan"},{"@pid":"08/45","text":"Chen-Khong Tham"}]},"title":"DRACo: Distributed, Robust an Asynchronous Coverage in Wireless Sensor Networks.","venue":"SECON","pages":"530-539","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/AiST07","doi":"10.1109/SAHCN.2007.4292865","ee":"https://doi.org/10.1109/SAHCN.2007.4292865","url":"https://dblp.org/rec/conf/secon/AiST07"}, "url":"URL#5602288" }, { "@score":"1", "@id":"5602289", "info":{"authors":{"author":[{"@pid":"22/5527","text":"Ortal Arazi"},{"@pid":"00/6984-1","text":"Hairong Qi 0001"},{"@pid":"35/459","text":"Derek Rose"}]},"title":"A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks.","venue":"SECON","pages":"51-59","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/AraziQR07","doi":"10.1109/SAHCN.2007.4292817","ee":"https://doi.org/10.1109/SAHCN.2007.4292817","url":"https://dblp.org/rec/conf/secon/AraziQR07"}, "url":"URL#5602289" }, { "@score":"1", "@id":"5602290", "info":{"authors":{"author":[{"@pid":"25/4803","text":"Mahesh Arumugam"},{"@pid":"k/SandeepSKulkarni","text":"Sandeep S. Kulkarni"}]},"title":"ProSe - A Programming Tool for Rapid Prototyping of Sensor Networks.","venue":"SECON","pages":"685-686","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ArumugamK07","doi":"10.1109/SAHCN.2007.4292882","ee":"https://doi.org/10.1109/SAHCN.2007.4292882","url":"https://dblp.org/rec/conf/secon/ArumugamK07"}, "url":"URL#5602290" }, { "@score":"1", "@id":"5602291", "info":{"authors":{"author":[{"@pid":"44/2529","text":"Erman Ayday"},{"@pid":"20/6286","text":"Farshid Delgosha"},{"@pid":"77/2313","text":"Faramarz Fekri"}]},"title":"Efficient Broadcast Authentication for Wireless Sensor Networks.","venue":"SECON","pages":"691-692","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/AydayDF07","doi":"10.1109/SAHCN.2007.4292885","ee":"https://doi.org/10.1109/SAHCN.2007.4292885","url":"https://dblp.org/rec/conf/secon/AydayDF07"}, "url":"URL#5602291" }, { "@score":"1", "@id":"5602292", "info":{"authors":{"author":[{"@pid":"84/4809-2","text":"Fan Bai 0002"},{"@pid":"h/AhmedHelmy","text":"Ahmed Helmy"}]},"title":"Impact of Mobility on Last Encounter Routing Protocols.","venue":"SECON","pages":"461-470","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/BaiH07","doi":"10.1109/SAHCN.2007.4292858","ee":"https://doi.org/10.1109/SAHCN.2007.4292858","url":"https://dblp.org/rec/conf/secon/BaiH07"}, "url":"URL#5602292" }, { "@score":"1", "@id":"5602293", "info":{"authors":{"author":[{"@pid":"45/3216","text":"Fang Bian"},{"@pid":"64/4920","text":"Sumit Rangwala"},{"@pid":"g/RameshGovindan","text":"Ramesh Govindan"}]},"title":"Quasi-static Centralized Rate Allocation for Sensor Networks.","venue":"SECON","pages":"361-370","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/BianRG07","doi":"10.1109/SAHCN.2007.4292848","ee":"https://doi.org/10.1109/SAHCN.2007.4292848","url":"https://dblp.org/rec/conf/secon/BianRG07"}, "url":"URL#5602293" }, { "@score":"1", "@id":"5602294", "info":{"authors":{"author":[{"@pid":"20/4777","text":"Bogdan Carbunar"},{"@pid":"46/2181-9","text":"Yang Yu 0009"},{"@pid":"73/5220","text":"Weidong Shi"},{"@pid":"04/3355","text":"Michael Pearce"},{"@pid":"19/5116","text":"Venu Vasudevan"}]},"title":"Query privacy in wireless sensor networks.","venue":"SECON","pages":"203-212","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/CarbunarYSPV07","doi":"10.1109/SAHCN.2007.4292832","ee":"https://doi.org/10.1109/SAHCN.2007.4292832","url":"https://dblp.org/rec/conf/secon/CarbunarYSPV07"}, "url":"URL#5602294" }, { "@score":"1", "@id":"5602295", "info":{"authors":{"author":[{"@pid":"05/4894","text":"Hoon Chang"},{"@pid":"29/6724","text":"Vishal Misra"},{"@pid":"r/DanRubenstein","text":"Dan Rubenstein"}]},"title":"Fairness and Physical Layer Capture in Random Access Networks.","venue":"SECON","pages":"381-390","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ChangMR07","doi":"10.1109/SAHCN.2007.4292850","ee":"https://doi.org/10.1109/SAHCN.2007.4292850","url":"https://dblp.org/rec/conf/secon/ChangMR07"}, "url":"URL#5602295" }, { "@score":"1", "@id":"5602296", "info":{"authors":{"author":[{"@pid":"18/2343-1","text":"Yingying Chen 0001"},{"@pid":"72/5440","text":"Wade Trappe"},{"@pid":"55/3942","text":"Richard P. Martin"}]},"title":"Detecting and Localizing Wireless Spoofing Attacks.","venue":"SECON","pages":"193-202","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ChenTM07","doi":"10.1109/SAHCN.2007.4292831","ee":"https://doi.org/10.1109/SAHCN.2007.4292831","url":"https://dblp.org/rec/conf/secon/ChenTM07"}, "url":"URL#5602296" }, { "@score":"1", "@id":"5602297", "info":{"authors":{"author":[{"@pid":"11/645","text":"Sukwon Choi"},{"@pid":"46/4787","text":"Hojung Cha"},{"@pid":"43/897","text":"SungChil Cho"}]},"title":"A SoC-based Sensor Node: Evaluation of RETOS-enabled CC2430.","venue":"SECON","pages":"132-141","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ChoiCC07","doi":"10.1109/SAHCN.2007.4292825","ee":"https://doi.org/10.1109/SAHCN.2007.4292825","url":"https://dblp.org/rec/conf/secon/ChoiCC07"}, "url":"URL#5602297" }, { "@score":"1", "@id":"5602298", "info":{"authors":{"author":[{"@pid":"17/711","text":"Heesook Choi"},{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"},{"@pid":"l/TomLaPorta","text":"Thomas F. La Porta"}]},"title":"Privacy Preserving Communication in MANETs.","venue":"SECON","pages":"233-242","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ChoiMP07","doi":"10.1109/SAHCN.2007.4292835","ee":"https://doi.org/10.1109/SAHCN.2007.4292835","url":"https://dblp.org/rec/conf/secon/ChoiMP07"}, "url":"URL#5602298" }, { "@score":"1", "@id":"5602299", "info":{"authors":{"author":[{"@pid":"19/6964","text":"Romit Roy Choudhury"},{"@pid":"v/NitinHVaidya","text":"Nitin H. Vaidya"}]},"title":"MAC-Layer Capture: A Problem in Wireless Mesh Networks using Beamforming Antennas.","venue":"SECON","pages":"401-410","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ChoudhuryV07","doi":"10.1109/SAHCN.2007.4292852","ee":"https://doi.org/10.1109/SAHCN.2007.4292852","url":"https://dblp.org/rec/conf/secon/ChoudhuryV07"}, "url":"URL#5602299" }, { "@score":"1", "@id":"5602300", "info":{"authors":{"author":{"@pid":"34/6714","text":"H. A. Cunningham"}},"title":"Sensor Localization with Lateral Inhibition & Statistical Inference.","venue":"SECON","pages":"700-702","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Cunningham07","doi":"10.1109/SAHCN.2007.4292889","ee":"https://doi.org/10.1109/SAHCN.2007.4292889","url":"https://dblp.org/rec/conf/secon/Cunningham07"}, "url":"URL#5602300" }, { "@score":"1", "@id":"5602301", "info":{"authors":{"author":[{"@pid":"c/RezaCurtmola","text":"Reza Curtmola"},{"@pid":"n/CristinaNitaRotaru","text":"Cristina Nita-Rotaru"}]},"title":"BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.","venue":"SECON","pages":"263-272","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/CurtmolaN07","doi":"10.1109/SAHCN.2007.4292838","ee":"https://doi.org/10.1109/SAHCN.2007.4292838","url":"https://dblp.org/rec/conf/secon/CurtmolaN07"}, "url":"URL#5602301" }, { "@score":"1", "@id":"5602302", "info":{"authors":{"author":[{"@pid":"31/2788","text":"Mischa Dohler"},{"@pid":"26/1072","text":"Dominique Barthel"},{"@pid":"m/FlorenceMaraninchi","text":"Florence Maraninchi"},{"@pid":"07/2632","text":"Laurent Mounier"},{"@pid":"84/4165","text":"Stephane Aubert"},{"@pid":"32/5852","text":"Christophe Dugas"},{"@pid":"48/2713","text":"Aurélien Buhrig"},{"@pid":"62/6376","text":"Franck Paugnat"},{"@pid":"59/4092","text":"Marc Renaudin"},{"@pid":"d/AndrzejDuda","text":"Andrzej Duda"},{"@pid":"75/523","text":"Martin Heusse"},{"@pid":"44/4907","text":"Fabrice Valois"}]},"title":"The ARESA Project: Facilitating Research, Development and Commercialization of WSNs.","venue":"SECON","pages":"590-599","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/DohlerBMMADBPRDHV07","doi":"10.1109/SAHCN.2007.4292871","ee":"https://doi.org/10.1109/SAHCN.2007.4292871","url":"https://dblp.org/rec/conf/secon/DohlerBMMADBPRDHV07"}, "url":"URL#5602302" }, { "@score":"1", "@id":"5602303", "info":{"authors":{"author":{"@pid":"08/1449","text":"Olivier Dousse"}},"title":"Revising buffering in multihop CSMA/CA wireless networks.","venue":"SECON","pages":"580-589","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Dousse07","doi":"10.1109/SAHCN.2007.4292870","ee":"https://doi.org/10.1109/SAHCN.2007.4292870","url":"https://dblp.org/rec/conf/secon/Dousse07"}, "url":"URL#5602303" }, { "@score":"1", "@id":"5602304", "info":{"authors":{"author":[{"@pid":"35/3198","text":"Ovidiu Valentin Drugan"},{"@pid":"p/TPlagemann","text":"Thomas Plagemann"},{"@pid":"19/1367","text":"Ellen Munthe-Kaas"}]},"title":"Non-intrusive Neighbor Prediction in Sparse MANETs.","venue":"SECON","pages":"172-182","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/DruganPM07","doi":"10.1109/SAHCN.2007.4292829","ee":"https://doi.org/10.1109/SAHCN.2007.4292829","url":"https://dblp.org/rec/conf/secon/DruganPM07"}, "url":"URL#5602304" }, { "@score":"1", "@id":"5602305", "info":{"authors":{"author":[{"@pid":"73/6973","text":"Patrik Floréen"},{"@pid":"41/6988","text":"Petteri Kaski"},{"@pid":"80/1772","text":"Jukka Suomela"}]},"title":"A distributed approximation scheme for sleep sceduling in sensor networks.","venue":"SECON","pages":"152-161","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/FloreenKS07","doi":"10.1109/SAHCN.2007.4292827","ee":"https://doi.org/10.1109/SAHCN.2007.4292827","url":"https://dblp.org/rec/conf/secon/FloreenKS07"}, "url":"URL#5602305" }, { "@score":"1", "@id":"5602306", "info":{"authors":{"author":[{"@pid":"10/6184","text":"Chittabrata Ghosh"},{"@pid":"a/DharmaPAgrawal","text":"Dharma P. Agrawal"}]},"title":"Cross Layer Performance Evaluation of a Software Defined Radio UWB Receiver using Turbo Decoding.","venue":"SECON","pages":"639-646","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/GhoshA07","doi":"10.1109/SAHCN.2007.4292876","ee":"https://doi.org/10.1109/SAHCN.2007.4292876","url":"https://dblp.org/rec/conf/secon/GhoshA07"}, "url":"URL#5602306" }, { "@score":"1", "@id":"5602307", "info":{"authors":{"author":[{"@pid":"83/5785","text":"Amitabha Amitava Ghosh"},{"@pid":"17/221-35","text":"Yi Wang 0035"},{"@pid":"87/2250","text":"Bhaskar Krishnamachari"}]},"title":"Efficient Distributed Topology Control in 3-Dimensional Wireless Networks.","venue":"SECON","pages":"91-100","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/GhoshWK07","doi":"10.1109/SAHCN.2007.4292821","ee":"https://doi.org/10.1109/SAHCN.2007.4292821","url":"https://dblp.org/rec/conf/secon/GhoshWK07"}, "url":"URL#5602307" }, { "@score":"1", "@id":"5602308", "info":{"authors":{"author":[{"@pid":"01/267-1","text":"Song Guo 0001"},{"@pid":"47/4060","text":"Oliver W. W. Yang"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Improving Scalability for Longest-lived Multicast Using Localized Operations in WANETs.","venue":"SECON","pages":"243-252","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/GuoYL07","doi":"10.1109/SAHCN.2007.4292836","ee":"https://doi.org/10.1109/SAHCN.2007.4292836","url":"https://dblp.org/rec/conf/secon/GuoYL07"}, "url":"URL#5602308" }, { "@score":"1", "@id":"5602309", "info":{"authors":{"author":[{"@pid":"76/6025","text":"Ashima Gupta"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"Energy Consumption and Conservation in WiFi Based Phones: A Measurement-Based Study.","venue":"SECON","pages":"122-131","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/GuptaM07","doi":"10.1109/SAHCN.2007.4292824","ee":"https://doi.org/10.1109/SAHCN.2007.4292824","url":"https://dblp.org/rec/conf/secon/GuptaM07"}, "url":"URL#5602309" }, { "@score":"1", "@id":"5602310", "info":{"authors":{"author":[{"@pid":"12/2617","text":"Albert F. Harris III"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"On the Design of Energy-efficient Routing Protocols in Underwater Networks.","venue":"SECON","pages":"80-90","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/HarrisZ07","doi":"10.1109/SAHCN.2007.4292820","ee":"https://doi.org/10.1109/SAHCN.2007.4292820","url":"https://dblp.org/rec/conf/secon/HarrisZ07"}, "url":"URL#5602310" }, { "@score":"1", "@id":"5602311", "info":{"authors":{"author":[{"@pid":"99/5935","text":"Hazer Inaltekin"},{"@pid":"21/3476","text":"Stephen B. Wicker"}]},"title":"The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference.","venue":"SECON","pages":"431-440","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/InaltekinW07","doi":"10.1109/SAHCN.2007.4292855","ee":"https://doi.org/10.1109/SAHCN.2007.4292855","url":"https://dblp.org/rec/conf/secon/InaltekinW07"}, "url":"URL#5602311" }, { "@score":"1", "@id":"5602312", "info":{"authors":{"author":[{"@pid":"99/5935","text":"Hazer Inaltekin"},{"@pid":"68/6928","text":"Tom Wexler"},{"@pid":"21/3476","text":"Stephen B. Wicker"}]},"title":"A Duopoly Pricing Game for Wireless IP Services.","venue":"SECON","pages":"600-609","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/InaltekinWW07","doi":"10.1109/SAHCN.2007.4292872","ee":"https://doi.org/10.1109/SAHCN.2007.4292872","url":"https://dblp.org/rec/conf/secon/InaltekinWW07"}, "url":"URL#5602312" }, { "@score":"1", "@id":"5602313", "info":{"authors":{"author":[{"@pid":"34/197","text":"Özlem Durmaz Incel"},{"@pid":"m/SapeJMullender","text":"Sape J. Mullender"},{"@pid":"j/PierrGJansen","text":"Pierre G. Jansen"},{"@pid":"64/875","text":"Stefan Dulman"}]},"title":"Measurements on the Efficiency of Overlapping Channels.","venue":"SECON","pages":"689-690","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/IncelMJD07","doi":"10.1109/SAHCN.2007.4292884","ee":"https://doi.org/10.1109/SAHCN.2007.4292884","url":"https://dblp.org/rec/conf/secon/IncelMJD07"}, "url":"URL#5602313" }, { "@score":"1", "@id":"5602314", "info":{"authors":{"author":[{"@pid":"21/3250","text":"Jangeun Jun"},{"@pid":"84/5608","text":"Mihail L. Sichitiu"},{"@pid":"63/30","text":"Hector D. Flores"},{"@pid":"54/5929","text":"Stephan J. Eidenbenz"}]},"title":"The Optimum Number of OSPF Areas for MANETs.","venue":"SECON","pages":"451-460","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/JunSFE07","doi":"10.1109/SAHCN.2007.4292857","ee":"https://doi.org/10.1109/SAHCN.2007.4292857","url":"https://dblp.org/rec/conf/secon/JunSFE07"}, "url":"URL#5602314" }, { "@score":"1", "@id":"5602315", "info":{"authors":{"author":[{"@pid":"14/3411","text":"Marcin Karpinski"},{"@pid":"c/VCahill","text":"Vinny Cahill"}]},"title":"High-Level Application Development is Realistic for Wireless Sensor Networks.","venue":"SECON","pages":"610-619","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/KarpinskiC07","doi":"10.1109/SAHCN.2007.4292873","ee":"https://doi.org/10.1109/SAHCN.2007.4292873","url":"https://dblp.org/rec/conf/secon/KarpinskiC07"}, "url":"URL#5602315" }, { "@score":"1", "@id":"5602316", "info":{"authors":{"author":[{"@pid":"75/6840","text":"Sanjit Krishnan Kaul"},{"@pid":"41/4630","text":"Kishore Ramachandran"},{"@pid":"83/4043","text":"Pravin Shankar"},{"@pid":"83/4965","text":"Sangho Oh"},{"@pid":"87/88","text":"Marco Gruteser"},{"@pid":"49/4817","text":"Ivan Seskar"},{"@pid":"66/4168","text":"Tamer Nadeem"}]},"title":"Effect of Antenna Placement and Diversity on Vehicular Network Communications.","venue":"SECON","pages":"112-121","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/KaulRSOGSN07","doi":"10.1109/SAHCN.2007.4292823","ee":"https://doi.org/10.1109/SAHCN.2007.4292823","url":"https://dblp.org/rec/conf/secon/KaulRSOGSN07"}, "url":"URL#5602316" }, { "@score":"1", "@id":"5602317", "info":{"authors":{"author":[{"@pid":"47/5802","text":"Alireza Keshavarz-Haddad"},{"@pid":"46/6552","text":"Rudolf H. Riedi"}]},"title":"On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference.","venue":"SECON","pages":"314-323","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Keshavarz-HaddadR07","doi":"10.1109/SAHCN.2007.4292843","ee":"https://doi.org/10.1109/SAHCN.2007.4292843","url":"https://dblp.org/rec/conf/secon/Keshavarz-HaddadR07"}, "url":"URL#5602317" }, { "@score":"1", "@id":"5602318", "info":{"authors":{"author":[{"@pid":"47/5802","text":"Alireza Keshavarz-Haddad"},{"@pid":"91/44","text":"Vinay J. Ribeiro"},{"@pid":"46/6552","text":"Rudolf H. Riedi"}]},"title":"DRB and DCCB: Efficient and Robust Dynamic Broadcast for Ad Hoc and Sensor Networks.","venue":"SECON","pages":"253-262","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Keshavarz-HaddadRR07","doi":"10.1109/SAHCN.2007.4292837","ee":"https://doi.org/10.1109/SAHCN.2007.4292837","url":"https://dblp.org/rec/conf/secon/Keshavarz-HaddadRR07"}, "url":"URL#5602318" }, { "@score":"1", "@id":"5602319", "info":{"authors":{"author":{"@pid":"84/4192","text":"Sang Wu Kim"}},"title":"Concatenated Random Parity Forwarding in Wireless Sensor Networks.","venue":"SECON","pages":"693-694","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Kim07","doi":"10.1109/SAHCN.2007.4292886","ee":"https://doi.org/10.1109/SAHCN.2007.4292886","url":"https://dblp.org/rec/conf/secon/Kim07"}, "url":"URL#5602319" }, { "@score":"1", "@id":"5602320", "info":{"authors":{"author":[{"@pid":"22/7285","text":"Shrinivasa Kini"},{"@pid":"40/2298","text":"Srinivasan Ramasubramanian"}]},"title":"SenNetSim: A GUI-Based Simulator for Sensor Networks.","venue":"SECON","pages":"703-704","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/KiniR07","doi":"10.1109/SAHCN.2007.4292890","ee":"https://doi.org/10.1109/SAHCN.2007.4292890","url":"https://dblp.org/rec/conf/secon/KiniR07"}, "url":"URL#5602320" }, { "@score":"1", "@id":"5602321", "info":{"authors":{"author":[{"@pid":"58/5837","text":"Masahiro Kuroda"},{"@pid":"23/3746","text":"Kentaro Ishizu"},{"@pid":"58/1585","text":"Hiroshi Harada"},{"@pid":"47/1017","text":"Ryoichi Komiya"}]},"title":"A Study of Radio-information Services for Networks of Cognitive Radios.","venue":"SECON","pages":"662-669","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/KurodaIHK07","doi":"10.1109/SAHCN.2007.4292879","ee":"https://doi.org/10.1109/SAHCN.2007.4292879","url":"https://dblp.org/rec/conf/secon/KurodaIHK07"}, "url":"URL#5602321" }, { "@score":"1", "@id":"5602322", "info":{"authors":{"author":[{"@pid":"58/5837","text":"Masahiro Kuroda"},{"@pid":"02/4410","text":"Ritsu Nomura"},{"@pid":"72/5440","text":"Wade Trappe"}]},"title":"A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios.","venue":"SECON","pages":"70-79","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/KurodaNT07","doi":"10.1109/SAHCN.2007.4292819","ee":"https://doi.org/10.1109/SAHCN.2007.4292819","url":"https://dblp.org/rec/conf/secon/KurodaNT07"}, "url":"URL#5602322" }, { "@score":"1", "@id":"5602323", "info":{"authors":{"author":[{"@pid":"05/5543","text":"Jeongkeun Lee"},{"@pid":"28/1552","text":"Sung-Ju Lee"},{"@pid":"39/6144","text":"Wonho Kim"},{"@pid":"19/4222","text":"Daehyung Jo"},{"@pid":"14/2293-1","text":"Taekyoung Kwon 0001"},{"@pid":"82/2088","text":"Yanghee Choi"}]},"title":"RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks.","venue":"SECON","pages":"491-500","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/LeeLKJKC07","doi":"10.1109/SAHCN.2007.4292861","ee":"https://doi.org/10.1109/SAHCN.2007.4292861","url":"https://dblp.org/rec/conf/secon/LeeLKJKC07"}, "url":"URL#5602323" }, { "@score":"1", "@id":"5602324", "info":{"authors":{"author":[{"@pid":"75/5939","text":"Vincent Lenders"},{"@pid":"71/5170","text":"Gunnar Karlsson"},{"@pid":"75/592","text":"Martin May"}]},"title":"Wireless Ad Hoc Podcasting.","venue":"SECON","pages":"273-283","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/LendersKM07","doi":"10.1109/SAHCN.2007.4292839","ee":"https://doi.org/10.1109/SAHCN.2007.4292839","url":"https://dblp.org/rec/conf/secon/LendersKM07"}, "url":"URL#5602324" }, { "@score":"1", "@id":"5602325", "info":{"authors":{"author":[{"@pid":"25/5368","text":"Sha Liu"},{"@pid":"72/4289","text":"Kai-Wei Fan"},{"@pid":"82/2823","text":"Prasun Sinha"}]},"title":"CMAC: An Energy Efficient MAC Layer Protocol Using Convergent Packet Forwarding for Wireless Sensor Networks.","venue":"SECON","pages":"11-20","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/LiuFS07","doi":"10.1109/SAHCN.2007.4292813","ee":"https://doi.org/10.1109/SAHCN.2007.4292813","url":"https://dblp.org/rec/conf/secon/LiuFS07"}, "url":"URL#5602325" }, { "@score":"1", "@id":"5602326", "info":{"authors":{"author":[{"@pid":"00/1811-4","text":"Ling Luo 0004"},{"@pid":"57/3191-1","text":"Sumit Roy 0001"}]},"title":"Analysis of Search Schemes in Cognitive Radio.","venue":"SECON","pages":"647-654","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/LuoR07","doi":"10.1109/SAHCN.2007.4292877","ee":"https://doi.org/10.1109/SAHCN.2007.4292877","url":"https://dblp.org/rec/conf/secon/LuoR07"}, "url":"URL#5602326" }, { "@score":"1", "@id":"5602327", "info":{"authors":{"author":[{"@pid":"52/6916","text":"Raluca Marin-Perianu"},{"@pid":"s/HansScholten","text":"Hans Scholten"},{"@pid":"h/PaulJMHavinga","text":"Paul J. M. Havinga"}]},"title":"Demo Abstract: Service Oriented Wireless Sensor Networks - A Cluster-based Approach.","venue":"SECON","pages":"698-699","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Marin-PerianuSH07","doi":"10.1109/SAHCN.2007.4292888","ee":"https://doi.org/10.1109/SAHCN.2007.4292888","url":"https://dblp.org/rec/conf/secon/Marin-PerianuSH07"}, "url":"URL#5602327" }, { "@score":"1", "@id":"5602328", "info":{"authors":{"author":[{"@pid":"58/4016","text":"Damon McCoy"},{"@pid":"64/948","text":"Douglas C. Sicker"},{"@pid":"g/DirkGrunwald","text":"Dirk Grunwald"}]},"title":"A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks.","venue":"SECON","pages":"678-684","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/McCoySG07","doi":"10.1109/SAHCN.2007.4292881","ee":"https://doi.org/10.1109/SAHCN.2007.4292881","url":"https://dblp.org/rec/conf/secon/McCoySG07"}, "url":"URL#5602328" }, { "@score":"1", "@id":"5602329", "info":{"authors":{"author":[{"@pid":"41/10142","text":"Robert D. Miller"},{"@pid":"10/3878-1","text":"Wenyuan Xu 0001"},{"@pid":"06/2530","text":"Pandurang Kamat"},{"@pid":"72/5440","text":"Wade Trappe"}]},"title":"Service Discovery and Device Identification in Cognitive Radio Networks.","venue":"SECON","pages":"670-677","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/MillerXKT07","doi":"10.1109/SAHCN.2007.4292880","ee":"https://doi.org/10.1109/SAHCN.2007.4292880","url":"https://dblp.org/rec/conf/secon/MillerXKT07"}, "url":"URL#5602329" }, { "@score":"1", "@id":"5602330", "info":{"authors":{"author":[{"@pid":"02/5023","text":"Kiran Misra"},{"@pid":"136/8377","text":"Shirish Karande 0001"},{"@pid":"r/HayderRadha","text":"Hayder Radha"}]},"title":"INPoD: In-Network Processing over Sensor Networks based on Code Design.","venue":"SECON","pages":"324-333","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/MisraKR07","doi":"10.1109/SAHCN.2007.4292844","ee":"https://doi.org/10.1109/SAHCN.2007.4292844","url":"https://dblp.org/rec/conf/secon/MisraKR07"}, "url":"URL#5602330" }, { "@score":"1", "@id":"5602331", "info":{"authors":{"author":[{"@pid":"270/9282","text":"Steven M. Myers"},{"@pid":"12/6346","text":"Seapahn Megerian"},{"@pid":"345/5455-1","text":"Suman Banerjee 0001"},{"@pid":"p/MiodragPotkonjak","text":"Miodrag Potkonjak"}]},"title":"Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization.","venue":"SECON","pages":"294-303","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/MyersMBP07","doi":"10.1109/SAHCN.2007.4292841","ee":"https://doi.org/10.1109/SAHCN.2007.4292841","url":"https://dblp.org/rec/conf/secon/MyersMBP07"}, "url":"URL#5602331" }, { "@score":"1", "@id":"5602332", "info":{"authors":{"author":[{"@pid":"31/3962","text":"Furuzan Atay Onat"},{"@pid":"65/6016","text":"Dan Avidor"},{"@pid":"44/3204","text":"Sayandev Mukherjee"}]},"title":"Two-hop Relaying in Random Networks with Limited Channel State Information.","venue":"SECON","pages":"570-579","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/OnatAM07","doi":"10.1109/SAHCN.2007.4292869","ee":"https://doi.org/10.1109/SAHCN.2007.4292869","url":"https://dblp.org/rec/conf/secon/OnatAM07"}, "url":"URL#5602332" }, { "@score":"1", "@id":"5602333", "info":{"authors":{"author":[{"@pid":"04/6981","text":"Lawrence Ong"},{"@pid":"83/4035","text":"Mehul Motani"}]},"title":"Optimal Routing for Decode-and-Forward based Cooperation in Wireless Networks.","venue":"SECON","pages":"334-343","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/OngM07","doi":"10.1109/SAHCN.2007.4292845","ee":"https://doi.org/10.1109/SAHCN.2007.4292845","url":"https://dblp.org/rec/conf/secon/OngM07"}, "url":"URL#5602333" }, { "@score":"1", "@id":"5602334", "info":{"authors":{"author":[{"@pid":"08/2998","text":"Tom Parker"},{"@pid":"l/KoenLangendoen","text":"Koen Langendoen"}]},"title":"Foxtrot: phase space data representation for correlation-aware aggregation.","venue":"SECON","pages":"353-360","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ParkerL07","doi":"10.1109/SAHCN.2007.4292847","ee":"https://doi.org/10.1109/SAHCN.2007.4292847","url":"https://dblp.org/rec/conf/secon/ParkerL07"}, "url":"URL#5602334" }, { "@score":"1", "@id":"5602335", "info":{"authors":{"author":[{"@pid":"66/4707","text":"Saad B. Qaisar"},{"@pid":"r/HayderRadha","text":"Hayder Radha"}]},"title":"OPERA: An Optimal Progressive Error Recovery Algorithm for Wireless Sensor Networks.","venue":"SECON","pages":"344-352","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/QaisarR07","doi":"10.1109/SAHCN.2007.4292846","ee":"https://doi.org/10.1109/SAHCN.2007.4292846","url":"https://dblp.org/rec/conf/secon/QaisarR07"}, "url":"URL#5602335" }, { "@score":"1", "@id":"5602336", "info":{"authors":{"author":[{"@pid":"20/6179-1","text":"Kui Ren 0001"},{"@pid":"73/3673","text":"Wenjing Lou"},{"@pid":"83/888","text":"Yanchao Zhang"}]},"title":"Multi-user Broadcast Authentication in Wireless Sensor Networks.","venue":"SECON","pages":"223-232","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/RenLZ07","doi":"10.1109/SAHCN.2007.4292834","ee":"https://doi.org/10.1109/SAHCN.2007.4292834","url":"https://dblp.org/rec/conf/secon/RenLZ07"}, "url":"URL#5602336" }, { "@score":"1", "@id":"5602337", "info":{"authors":{"author":[{"@pid":"s/ArunabhaSen","text":"Arunabha Sen"},{"@pid":"06/220","text":"Nibedita Das"},{"@pid":"86/949","text":"Ling Zhou"},{"@pid":"44/5443","text":"Bao Hong Shen"},{"@pid":"56/3266","text":"Sudheendra Murthy"},{"@pid":"50/4575","text":"Prajesh Bhattacharya"}]},"title":"Coverage Problem for Sensors Embedded in Temperature Sensitive Environments.","venue":"SECON","pages":"520-529","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SenDZSMB07","doi":"10.1109/SAHCN.2007.4292864","ee":"https://doi.org/10.1109/SAHCN.2007.4292864","url":"https://dblp.org/rec/conf/secon/SenDZSMB07"}, "url":"URL#5602337" }, { "@score":"1", "@id":"5602338", "info":{"authors":{"author":[{"@pid":"137/8732","text":"Abhishek B. Sharma"},{"@pid":"g/LeanaGolubchik","text":"Leana Golubchik"},{"@pid":"g/RameshGovindan","text":"Ramesh Govindan"}]},"title":"On the Prevalence of Sensor Faults in Real-World Deployments.","venue":"SECON","pages":"213-222","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SharmaGG07","doi":"10.1109/SAHCN.2007.4292833","ee":"https://doi.org/10.1109/SAHCN.2007.4292833","url":"https://dblp.org/rec/conf/secon/SharmaGG07"}, "url":"URL#5602338" }, { "@score":"1", "@id":"5602339", "info":{"authors":{"author":[{"@pid":"67/4182","text":"Shrutivandana Sharma"},{"@pid":"40/1496","text":"Demosthenis Teneketzis"}]},"title":"An Externality-based Decentralized Optimal Power Allocation Scheme for Wireless Mesh Networks.","venue":"SECON","pages":"284-293","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SharmaT07","doi":"10.1109/SAHCN.2007.4292840","ee":"https://doi.org/10.1109/SAHCN.2007.4292840","url":"https://dblp.org/rec/conf/secon/SharmaT07"}, "url":"URL#5602339" }, { "@score":"1", "@id":"5602340", "info":{"authors":{"author":[{"@pid":"00/3680-1","text":"Yi Shi 0001"},{"@pid":"h/YTHou","text":"Yiwei Thomas Hou"}]},"title":"Approximation Algorithm for Base Station Placement in Wireless Sensor Networks.","venue":"SECON","pages":"512-519","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ShiH07","doi":"10.1109/SAHCN.2007.4292863","ee":"https://doi.org/10.1109/SAHCN.2007.4292863","url":"https://dblp.org/rec/conf/secon/ShiH07"}, "url":"URL#5602340" }, { "@score":"1", "@id":"5602341", "info":{"authors":{"author":[{"@pid":"66/2424","text":"Vinod Shukla"},{"@pid":"32/2358","text":"Daji Qiao"}]},"title":"Distinguishing Data Transience from False Injection in Sensor Networks.","venue":"SECON","pages":"41-50","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ShuklaQ07","doi":"10.1109/SAHCN.2007.4292816","ee":"https://doi.org/10.1109/SAHCN.2007.4292816","url":"https://dblp.org/rec/conf/secon/ShuklaQ07"}, "url":"URL#5602341" }, { "@score":"1", "@id":"5602342", "info":{"authors":{"author":[{"@pid":"93/2522","text":"Angad Singh"},{"@pid":"62/3017","text":"David Starobinski"}]},"title":"A Semi Markov-based Analysis of Rate Adaptation Algorithms in Wireless LANs.","venue":"SECON","pages":"371-380","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SinghS07","doi":"10.1109/SAHCN.2007.4292849","ee":"https://doi.org/10.1109/SAHCN.2007.4292849","url":"https://dblp.org/rec/conf/secon/SinghS07"}, "url":"URL#5602342" }, { "@score":"1", "@id":"5602343", "info":{"authors":{"author":[{"@pid":"15/601","text":"Patrick Stuedi"},{"@pid":"a/GustavoAlonso","text":"Gustavo Alonso"}]},"title":"Log-normal shadowing meets SINR: A numerical study of Capacity in Wireless Networks.","venue":"SECON","pages":"550-559","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/StuediA07","doi":"10.1109/SAHCN.2007.4292867","ee":"https://doi.org/10.1109/SAHCN.2007.4292867","url":"https://dblp.org/rec/conf/secon/StuediA07"}, "url":"URL#5602343" }, { "@score":"1", "@id":"5602344", "info":{"authors":{"author":[{"@pid":"44/5120","text":"Ramanan Subramanian"},{"@pid":"77/2313","text":"Faramarz Fekri"}]},"title":"Analysis of Latency and Related Tradeoffs in Distribute Sensor Networks.","venue":"SECON","pages":"391-400","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SubramanianF07","doi":"10.1109/SAHCN.2007.4292851","ee":"https://doi.org/10.1109/SAHCN.2007.4292851","url":"https://dblp.org/rec/conf/secon/SubramanianF07"}, "url":"URL#5602344" }, { "@score":"1", "@id":"5602345", "info":{"authors":{"author":[{"@pid":"52/3887","text":"Anand Prabhu Subramanian"},{"@pid":"g/HimanshuGupta","text":"Himanshu Gupta 0001"},{"@pid":"90/4174","text":"Samir R. Das"}]},"title":"Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks.","venue":"SECON","pages":"481-490","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/SubramanianGD07","doi":"10.1109/SAHCN.2007.4292860","ee":"https://doi.org/10.1109/SAHCN.2007.4292860","url":"https://dblp.org/rec/conf/secon/SubramanianGD07"}, "url":"URL#5602345" }, { "@score":"1", "@id":"5602346", "info":{"authors":{"author":[{"@pid":"18/6302","text":"Kefeng Tan"},{"@pid":"86/1346","text":"Zhiwen Wan"},{"@pid":"10/3520","text":"Hao Zhu"},{"@pid":"23/3963","text":"Jean Andrian"}]},"title":"CODE: Cooperative Medium Access for Multirate Wireless Ad Hoc Network.","venue":"SECON","pages":"1-10","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/TanWZA07","doi":"10.1109/SAHCN.2007.4292812","ee":"https://doi.org/10.1109/SAHCN.2007.4292812","url":"https://dblp.org/rec/conf/secon/TanWZA07"}, "url":"URL#5602346" }, { "@score":"1", "@id":"5602347", "info":{"authors":{"author":[{"@pid":"47/2291","text":"Hsin-Mu Tsai"},{"@pid":"03/3950","text":"Wantanee Viriyasitavat"},{"@pid":"96/1437","text":"Ozan K. Tonguz"},{"@pid":"89/3816","text":"Cem U. Saraydar"},{"@pid":"04/977","text":"Timothy Talty"},{"@pid":"34/6364","text":"Andrew MacDonald"}]},"title":"Feasibility of In-car Wireless Sensor Networks: A Statistical Evaluation.","venue":"SECON","pages":"101-111","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/TsaiVTSTM07","doi":"10.1109/SAHCN.2007.4292822","ee":"https://doi.org/10.1109/SAHCN.2007.4292822","url":"https://dblp.org/rec/conf/secon/TsaiVTSTM07"}, "url":"URL#5602347" }, { "@score":"1", "@id":"5602348", "info":{"authors":{"author":{"@pid":"v/NitinHVaidya","text":"Nitin H. Vaidya"}},"title":"Multi-Channel Wireless Networks: Theory to Practice.","venue":"SECON","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/Vaidya07","doi":"10.1109/SAHCN.2007.4292810","ee":"https://doi.org/10.1109/SAHCN.2007.4292810","url":"https://dblp.org/rec/conf/secon/Vaidya07"}, "url":"URL#5602348" }, { "@score":"1", "@id":"5602349", "info":{"authors":{"author":[{"@pid":"13/6174","text":"Sam Vakil"},{"@pid":"86/2829","text":"Ben Liang 0001"}]},"title":"Decentralized Multiuser Diversity with Cooperative Relaying in Wireless Sensor Networks.","venue":"SECON","pages":"560-569","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/VakilL07","doi":"10.1109/SAHCN.2007.4292868","ee":"https://doi.org/10.1109/SAHCN.2007.4292868","url":"https://dblp.org/rec/conf/secon/VakilL07"}, "url":"URL#5602349" }, { "@score":"1", "@id":"5602350", "info":{"authors":{"author":[{"@pid":"66/5166","text":"Christopher M. Vigorito"},{"@pid":"g/DeepakGanesan","text":"Deepak Ganesan"},{"@pid":"a/AndrewGBarto","text":"Andrew G. Barto"}]},"title":"Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks.","venue":"SECON","pages":"21-30","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/VigoritoGB07","doi":"10.1109/SAHCN.2007.4292814","ee":"https://doi.org/10.1109/SAHCN.2007.4292814","url":"https://dblp.org/rec/conf/secon/VigoritoGB07"}, "url":"URL#5602350" }, { "@score":"1", "@id":"5602351", "info":{"authors":{"author":[{"@pid":"20/3346-1","text":"Beibei Wang 0001"},{"@pid":"39/1298","text":"Zhu Ji"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"Self-Learning Repeated Game Framework for Distributed Primary-Prioritized Dynamic Spectrum Access.","venue":"SECON","pages":"631-638","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/WangJL07","doi":"10.1109/SAHCN.2007.4292875","ee":"https://doi.org/10.1109/SAHCN.2007.4292875","url":"https://dblp.org/rec/conf/secon/WangJL07"}, "url":"URL#5602351" }, { "@score":"1", "@id":"5602352", "info":{"authors":{"author":[{"@pid":"35/7092-74","text":"Wei Wang 0074"},{"@pid":"76/1820-2","text":"Xin Liu 0002"},{"@pid":"34/4957","text":"Dilip Krishnaswamy"}]},"title":"Robust Routing and Scheduling in Wireless Mesh Networks.","venue":"SECON","pages":"471-480","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/WangLK07","doi":"10.1109/SAHCN.2007.4292859","ee":"https://doi.org/10.1109/SAHCN.2007.4292859","url":"https://dblp.org/rec/conf/secon/WangLK07"}, "url":"URL#5602352" }, { "@score":"1", "@id":"5602353", "info":{"authors":{"author":[{"@pid":"35/1647","text":"Qin Wang"},{"@pid":"91/1817","text":"Woodward Yang"}]},"title":"Energy Consumption Model for Power Management in Wireless Sensor Networks.","venue":"SECON","pages":"142-151","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/WangY07","doi":"10.1109/SAHCN.2007.4292826","ee":"https://doi.org/10.1109/SAHCN.2007.4292826","url":"https://dblp.org/rec/conf/secon/WangY07"}, "url":"URL#5602353" }, { "@score":"1", "@id":"5602354", "info":{"authors":{"author":[{"@pid":"35/6771","text":"Bernhard Wiegel"},{"@pid":"48/1512","text":"Yvonne Günter"},{"@pid":"69/3033","text":"Hans Peter Großmann"}]},"title":"Concept of a Cross-Layer Design for Packet Routing in Vehicular Ad Hoc Networks.","venue":"SECON","pages":"687-688","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/WiegelGG07","doi":"10.1109/SAHCN.2007.4292883","ee":"https://doi.org/10.1109/SAHCN.2007.4292883","url":"https://dblp.org/rec/conf/secon/WiegelGG07"}, "url":"URL#5602354" }, { "@score":"1", "@id":"5602355", "info":{"authors":{"author":[{"@pid":"53/2947","text":"Anthony D. Wood"},{"@pid":"s/JohnAStankovic","text":"John A. Stankovic"},{"@pid":"67/4904","text":"Gang Zhou"}]},"title":"DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks.","venue":"SECON","pages":"60-69","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/WoodSZ07","doi":"10.1109/SAHCN.2007.4292818","ee":"https://doi.org/10.1109/SAHCN.2007.4292818","url":"https://dblp.org/rec/conf/secon/WoodSZ07"}, "url":"URL#5602355" }, { "@score":"1", "@id":"5602356", "info":{"authors":{"author":[{"@pid":"13/1779-7","text":"Xue Yang 0007"},{"@pid":"v/NitinHVaidya","text":"Nitin H. Vaidya"}]},"title":"A Spatial Backoff Algorithm Using the Joint Control of Carrier Sense Threshold and Transmission Rate.","venue":"SECON","pages":"501-511","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/YangV07","doi":"10.1109/SAHCN.2007.4292862","ee":"https://doi.org/10.1109/SAHCN.2007.4292862","url":"https://dblp.org/rec/conf/secon/YangV07"}, "url":"URL#5602356" }, { "@score":"1", "@id":"5602357", "info":{"authors":{"author":[{"@pid":"74/1008","text":"Sungwon Yang"},{"@pid":"30/3948","text":"Jiyoung Yi"},{"@pid":"46/4787","text":"Hojung Cha"}]},"title":"HCRL: A Hop-Count-Ratio based Localization in Wireless Sensor Networks.","venue":"SECON","pages":"31-40","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/YangYC07","doi":"10.1109/SAHCN.2007.4292815","ee":"https://doi.org/10.1109/SAHCN.2007.4292815","url":"https://dblp.org/rec/conf/secon/YangYC07"}, "url":"URL#5602357" }, { "@score":"1", "@id":"5602358", "info":{"authors":{"author":[{"@pid":"13/1779-7","text":"Xue Yang 0007"},{"@pid":"93/4160-1","text":"Jing Zhu 0001"},{"@pid":"89/5643","text":"Xingang Guo"}]},"title":"Using "Scaled Credit Payback" to Achieve Soft-fairness for Disruptive Radios in CSMA Networks.","venue":"SECON","pages":"695-697","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/YangZG07","doi":"10.1109/SAHCN.2007.4292887","ee":"https://doi.org/10.1109/SAHCN.2007.4292887","url":"https://dblp.org/rec/conf/secon/YangZG07"}, "url":"URL#5602358" }, { "@score":"1", "@id":"5602359", "info":{"authors":{"author":[{"@pid":"30/3948","text":"Jiyoung Yi"},{"@pid":"74/1008","text":"Sungwon Yang"},{"@pid":"46/4787","text":"Hojung Cha"}]},"title":"Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks.","venue":"SECON","pages":"162-171","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/YiYC07","doi":"10.1109/SAHCN.2007.4292828","ee":"https://doi.org/10.1109/SAHCN.2007.4292828","url":"https://dblp.org/rec/conf/secon/YiYC07"}, "url":"URL#5602359" }, { "@score":"1", "@id":"5602360", "info":{"authors":{"author":[{"@pid":"43/2062","text":"Ossama Younis"},{"@pid":"47/2755","text":"Marwan Krunz"},{"@pid":"40/2298","text":"Srinivasan Ramasubramanian"}]},"title":"A Framework for Resilient Online Coverage in Sensor Networks.","venue":"SECON","pages":"540-549","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/YounisKR07","doi":"10.1109/SAHCN.2007.4292866","ee":"https://doi.org/10.1109/SAHCN.2007.4292866","url":"https://dblp.org/rec/conf/secon/YounisKR07"}, "url":"URL#5602360" }, { "@score":"1", "@id":"5602361", "info":{"authors":{"author":[{"@pid":"50/671-86","text":"Yu Zhang 0086"},{"@pid":"17/4296","text":"Gautam D. Bhanage"},{"@pid":"72/5440","text":"Wade Trappe"},{"@pid":"44/2799","text":"Yanyong Zhang"},{"@pid":"26/1455","text":"Richard E. Howard"}]},"title":"Facilitating an Active Transmit-only RFID System Through Receiver-based Processing.","venue":"SECON","pages":"421-430","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ZhangBTZH07","doi":"10.1109/SAHCN.2007.4292854","ee":"https://doi.org/10.1109/SAHCN.2007.4292854","url":"https://dblp.org/rec/conf/secon/ZhangBTZH07"}, "url":"URL#5602361" }, { "@score":"1", "@id":"5602362", "info":{"authors":{"author":[{"@pid":"41/3382","text":"Mingze Zhang"},{"@pid":"28/6329","text":"Mun Choon Chan"},{"@pid":"a/AkkihebbalLAnanda","text":"Akkihebbal L. Ananda"}]},"title":"Coverage Protocol for Wireless Sensor Networks Using Distance Estimates.","venue":"SECON","pages":"183-192","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ZhangCA07","doi":"10.1109/SAHCN.2007.4292830","ee":"https://doi.org/10.1109/SAHCN.2007.4292830","url":"https://dblp.org/rec/conf/secon/ZhangCA07"}, "url":"URL#5602362" }, { "@score":"1", "@id":"5602363", "info":{"authors":{"author":[{"@pid":"67/3376","text":"Zifei Zhong"},{"@pid":"n/SrihariNelakuditi","text":"Srihari Nelakuditi"}]},"title":"On the Efficacy of Opportunistic Routing.","venue":"SECON","pages":"441-450","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ZhongN07","doi":"10.1109/SAHCN.2007.4292856","ee":"https://doi.org/10.1109/SAHCN.2007.4292856","url":"https://dblp.org/rec/conf/secon/ZhongN07"}, "url":"URL#5602363" }, { "@score":"1", "@id":"5602364", "info":{"authors":{"author":[{"@pid":"99/2747-8","text":"Yuanyuan Zhou 0008"},{"@pid":"45/292","text":"Muralidhar Medidi"}]},"title":"Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks.","venue":"SECON","pages":"304-313","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ZhouM07","doi":"10.1109/SAHCN.2007.4292842","ee":"https://doi.org/10.1109/SAHCN.2007.4292842","url":"https://dblp.org/rec/conf/secon/ZhouM07"}, "url":"URL#5602364" }, { "@score":"1", "@id":"5602365", "info":{"authors":{"author":[{"@pid":"88/490","text":"Chenxi Zhu"},{"@pid":"66/4168","text":"Tamer Nadeem"},{"@pid":"81/3995","text":"Jonathan R. Agre"}]},"title":"On Spatial Fairness of the 802.11 DCF Protocol and the Role of Directional Antenna.","venue":"SECON","pages":"411-420","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/secon/ZhuNA07","doi":"10.1109/SAHCN.2007.4292853","ee":"https://doi.org/10.1109/SAHCN.2007.4292853","url":"https://dblp.org/rec/conf/secon/ZhuNA07"}, "url":"URL#5602365" }, { "@score":"1", "@id":"5621849", "info":{"title":"Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA","venue":"SECON","publisher":"IEEE","year":"2007","type":"Editorship","key":"conf/secon/2007","ee":"https://ieeexplore.ieee.org/xpl/conhome/4292804/proceeding","url":"https://dblp.org/rec/conf/secon/2007"}, "url":"URL#5621849" } ] } } } )