Search For:

Displaying 1-11 out of 11 total
Link Dynamics and Protocol Design in a Multihop Mobile Environment
Found in: IEEE Transactions on Mobile Computing
By Prince Samar, Stephen B. Wicker
Issue Date:September 2006
pp. 1156-1172
A multihop ad hoc network with mobile elements is considered. A model is created and analytic expressions derived to characterize the statistics for link lifetime, new link interarrival time, link breakage interarrival time, and link change interarrival ti...
A Privacy-Aware Design for the Vehicle-to-Grid Framework
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Dipayan P. Ghosh,Robert J. Thomas,Stephen B. Wicker
Issue Date:January 2013
pp. 2283-2291
The vehicle-to-grid (V2G) framework proposes integration of battery-powered electric drive vehicles into the grid, enabling them to be recharged as necessary and to act as suppliers in the ancillary service electricity markets. This is expected to create i...
Economic analysis of privacy-aware Advanced Metering Infrastructure adoption
Found in: Innovative Smart Grid Technologies, IEEE PES
By Dipayan P. Ghosh,Dawn E. Schrader,William D. Schulze,Stephen B. Wicker
Issue Date:January 2012
pp. 1-4
Demand response systems primarily seek to reduce demand levels during periods of high load and increase demand as necessary in the off-peak hours. The objective of this flattening of the demand curve is to curb the need for generators to frequently ramp up...
Inferring Personal Information from Demand-Response Systems
Found in: IEEE Security and Privacy
By Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker
Issue Date:January 2010
pp. 11-20
Current and upcoming demand-response systems provide increasingly detailed power-consumption data to utilities and a growing array of players angling to assist consumers in understanding and managing their energy use. The granularity of this data, as well ...
Transactional Confidentiality in Sensor Networks
Found in: IEEE Security and Privacy
By Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen B. Wicker, Deirdre K. Mulligan, Shankar Sastry
Issue Date:July 2008
pp. 28-35
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploy...
On Selection of Optimal Transmission Power for Ad hoc Networks
Found in: Hawaii International Conference on System Sciences
By Yurong Chen, Emin Gün Sirer, Stephen B. Wicker
Issue Date:January 2003
pp. 300c
This paper investigates the problem of selecting an energy-efficient transmission power for ad hoc networks. Specifically, we examine how to determine a network-wide transmission power that minimizes global energy consumption, with desired lower bounds on ...
Access to the internet is a human right
Found in: Communications of the ACM
By Stephanie M. Santoso, Stephen B. Wicker
Issue Date:June 2013
pp. 43-46
Connecting Internet access with freedom of expression and creativity.
The loss of location privacy in the cellular age
Found in: Communications of the ACM
By Stephen B. Wicker
Issue Date:August 2012
pp. 60-68
How to have the best of location-based services while avoiding the growing threat to personal privacy.
Cellular telephony and the question of privacy
Found in: Communications of the ACM
By Stephen B. Wicker
Issue Date:July 2011
pp. 88-98
A private overlay may ease concerns over surveillance tools supported by cellular networks.
On the optimal distribution of sensors in a random field
Found in: ACM Transactions on Sensor Networks (TOSN)
By Stephen B. Wicker, Xin Zhang
Issue Date:November 2005
pp. 301-306
This article considers the problem of distributing sensors to observe a random field while meeting a series of energy and coverage constraints. In the network under consideration, N identical sensors are to be distributed, with each sensor sending data to ...
A decision-theoretic approach to resource allocation in wireless multimedia networks
Found in: Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications (DIALM '00)
By Joseph Y. Halpern, Li Li, Stephen B. Wicker, Zygmunt Haas
Issue Date:August 2000
pp. 86-95
The allocation of scarce spectral resources to support as many user applications as possible while maintaining reasonable quality of service is a fundamental problem in wireless communication. We argue that the problem is best formulated in terms of decisi...