- Adib, F., Kabelac, Z., Katabi, D. and Miller, R.C. 3D tracking via body radio reflections. In 11<sup>th</sup> USENIX Symp. Networked Syst. Design and Implement. (2014), 317--329. Google ScholarDigital Library
- Adib, F., Mao, H., Kabelac, Z., Katabi, D. and Miller, R.C. Smart homes that monitor breathing and heart rate. CHI (2015). Google ScholarDigital Library
- Pu, Q., Gupta, S., Gollakota, S. and Patel, S. Wholehome gesture recognition using wireless signals. In Proceedings of the 19<sup>th</sup> Annual Intern. Conf. Mobile Comput. & Netwk. (2013), ACM, 27--38. Google ScholarDigital Library
- Wilson, J. and Patwari, N. Demo abstract: Radio tomographic imaging. MobiCom (2008).Google Scholar
- Youssef, M., Mah, M. and Agrawala, A. Challenges: Device-free passive localization for wireless environments. MobiCom (2007). Google ScholarDigital Library
Index Terms
- Technical perspective: Is your WiFi a sensor?
Recommendations
Adopting IMS in WiFi technology
Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technologyIP Multimedia Subsystem which is standardized by 3GPP is an important step to improve the delivery of innovating IP-Telephony and Multimedia services to the customers in 3G and B3G networks. However, IMS is almost access independent and multiple access ...
Vehicular WiFi offloading
WiFi offloading is envisioned as a promising solution to the mobile data explosion problem in cellular networks. WiFi offloading for moving vehicles, however, poses unique characteristics and challenges, due to high mobility, fluctuating mobile channels,...
Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsThis paper presents a study for performance implementation of IEEE 802.11i WPA2 (Wi-Fi Protected Access 2) security protocol in Sensor Network applications. This research compared the implementation of the WPA2 security protocols over Sensor Networks to ...
Comments