Search Results - "Lazos, L"
-
1
HiRLoc: high-resolution robust localization for wireless sensor networks
Published in IEEE journal on selected areas in communications (01-02-2006)“…In this paper, we address the problem of robustly estimating the position of randomly deployed nodes of a wireless sensor network (WSN), in the presence of…”
Get full text
Journal Article -
2
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Published in IEEE transactions on dependable and secure computing (01-01-2012)“…The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional…”
Get full text
Journal Article -
3
Energy and Bandwidth-Efficient Key Distribution in Wireless Ad Hoc Networks: A Cross-Layer Approach
Published in IEEE/ACM transactions on networking (01-12-2007)“…We address the problem of resource-efficient access control for group communications in wireless ad hoc networks. Restricting the access to group data can be…”
Get full text
Journal Article -
4
Co-existence of os acromiale with suprascapular osseous bridge: a case report and review of the literature
Published in Folia morphologica (01-05-2009)“…We report on a very rare case of co-existence of os acromiale with suprascapular osseous bridge in a dry scapula. The frequency of os acromiale alone ranges…”
Get full text
Journal Article -
5
ROPE: robust position estimation in wireless sensor networks
Published in IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005 (2005)“…We address the problem of secure location determination, known as secure localization, and the problem of verifying the location claim of a node, known as…”
Get full text
Conference Proceeding -
6
Vulnerabilities of cognitive radio MAC protocols and countermeasures
Published in IEEE network (01-05-2013)“…Cognitive Radio (CR) is a promising technology for opportunistically accessing underutilized licensed spectrum to achieve higher spectrum efficiency and…”
Get full text
Journal Article -
7
Selective jamming/dropping insider attacks in wireless mesh networks
Published in IEEE network (01-01-2011)“…Wireless mesh networks promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their…”
Get full text
Journal Article -
8
Selective Jamming Attacks in Wireless Networks
Published in 2010 IEEE International Conference on Communications (01-05-2010)“…We address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary selectively targets specific packets of "high"…”
Get full text
Conference Proceeding -
9
Time-Delayed Broadcasting for Defeating Inside Jammers
Published in IEEE transactions on dependable and secure computing (01-05-2015)“…We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which…”
Get full text
Journal Article -
10
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
Published in 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) (2004)“…This paper considers the problem of secure multicast in an energy-constrained wireless environment. We present an analytical formulation of the energy…”
Get full text
Conference Proceeding -
11
Microanatomy of the vasa vasorum of the human thoracic aorta: a study utilizing a polyester resin casting technique
Published in Morphologie (01-03-1997)“…We have studied the vasa vasorum of the human thoracic aorta using a polyester resin casting technique, coupled with the tissue clearing method of Spalteholz…”
Get more information
Journal Article -
12
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
Published in IEEE Wireless Communications and Networking Conference, 2005 (2005)“…We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising…”
Get full text
Conference Proceeding -
13
Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks
Published in 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (01-06-2009)“…We address the problem of dynamic assignment of coordination (control) channels in cognitive radio networks (CRNs) by exploiting time- and space-varying…”
Get full text
Conference Proceeding -
14
Energy-aware secure multicast communication in ad-hoc networks using geographic location information
Published in 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03) (2003)“…The problem of securing multicast communications in an energy-constrained ad-hoc network requires the efficient management of cryptographic quantities. We show…”
Get full text
Conference Proceeding -
15
The use of unsaturated polyester resin solutions in preparing casts of the renal vessels
Published in Bulletin de l'Association des anatomistes (01-03-1985)“…A technique to prepare casts of the renal vessels using unsaturated polyester resin solutions is described. The dimensions, morphology and relations of the…”
Get more information
Journal Article -
16
A Primary User authentication system for mobile cognitive radio networks
Published in 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010) (01-11-2010)“…Cognitive radio networks (CRNs) exploit the idle portion of the licensed spectrum to establish network communications. Essential to the co-existence of this…”
Get full text
Conference Proceeding -
17
Hiding contextual information in WSNs
Published in 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (01-06-2012)“…We address the problem of preserving the confidentiality of contextual information in wireless sensor networks (WSNs). Such information includes the time and…”
Get full text
Conference Proceeding -
18
Coverage In Heterogeneous Sensor Networks
Published in 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2006)“…In this paper we study the problem of coverage in heterogeneous planar sensor networks. Coverage as a performance metric, quantifies the quality of monitoring…”
Get full text
Conference Proceeding -
19
Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits
Published in 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (01-06-2008)“…We address the problem of identifying misbehaving nodes that (selectively) drop packets, in order to degrade the network performance. Such nodes may agree to…”
Get full text
Conference Proceeding -
20
On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets
Published in 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (01-04-2007)“…Detecting targets moving inside a field of interest is one of the fundamental services of Wireless Sensor Networks. The network performance with respect to…”
Get full text
Conference Proceeding