|
[1] http://en.wikipedia.org/wiki/Global_Positioning_System [2] http://en.wikipedia.org/wiki/GPS_Phone [3] http://en.wikipedia.org/wiki/Satellite_navigation_system [4] Ekahau, Wifi Positioning Engine, http://www.ekahau.com/ [5] P. Rong and M.L. Sichitiu. “Angle of Arrival Localization for Wireless Sensor Networks,” in Proc. of Sensor and Ad Hoc Communications and Networks, 2006. vol. 1, pp. 374-382, Sept. 2006 [6] Nissanka B. Priyantha, Anit Chakraborty, and Hari Balakrishnan, “The Cricket Location-Support System,” 6th ACM International Conference on Mobile Computing and Networking (ACM MOBICOM), Boston, MA, August 2000 [7] P. Bahl and V. N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” in Infocom 2000, pp 775–784, 2000. [8] http://en.wikipedia.org/wiki/Received_Signal_Strength_Indication [9] S Meguerdichian, S Slijepcevic, V Karayan, “Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure,” Symposium on Mobile ad hoc networking & computing, 2001 [10] X Shen, JW and Mark, J Ye, “Mobile location estimation in cellular networks using fuzzy logic,” Vehicular Technology Conference, 2000. IEEE VTS-Fall VTC, Vol.5, Sept. 2000 [11] S Valaee, B Champagne, P Kabal, “Localization of wideband signals using least-squares and totalleast-squares approaches,” IEEE Transactions on Signal Processing, 1999 [12] TS Stamoulakatos, ED Sykas, “Hidden Markov modeling and macroscopic traffic filtering supporting location-based services, ” Wireless Communications and Mobile Computing, 2007 [13] LBreiman, JH Friedman, R Olshen,” Classification and regression trees,” 1984 [14] D-LINK Product : WiFi Wireless Access Point, DAP-1353 http://www.dlinktw.com.tw/product_view.asp?subMenuCode=&sno=LPFMHS [15] B O’Hara, A Petrick, “The IEEE 802.11 Handbook: A Designer’s Companion,” 1999 [16] Mustafa Ergen Ergenm, “IEEE 802.11 Tutorial,” 1999 [17] Mangold, Berlemann, “QoS Support as Utility for Coexisting Wireless LANs,” 2002 [18] Bruce Potter, “802.11 Security,” O’Reilly & Associates Inc [19] Nikita Borisov , Ian Goldberg , David Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11,” Proceedings of the 7th annual international conference on Mobile computing and networking, 2001 [20] N. Cam-Winget, R Housley, D Wagner,Jesse Walker “Security flaws in 802.11 data link protocols,” Communications of the ACM ,Volume 46 , Issue 5 , May 2003 [21] X Yuan, OT Wright, H Yu, KA Williams, "Laboratory design for wireless network attacks," Proceedings of the 5th annual conference on Information security curriculum development, 2008 [22] K Swiat, " The travelling menace: rogue hotspots," Computer Fraud & Security, 2006 [23] http://www.aircrack-ng.org/doku.php?id=Airodump-ng [24] PE Danielsson, "Euclidean distance mapping," Computer Graphics and image processing, 1980 [25] H Breu, J Gil, D Kirkpatrick, M Werman, "Linear time Euclidean distance transform algorithms," IEEE Transactions on Pattern Analysis and Machine, 1995 [26] I Ragnemalm (Linkoping Univ),"The Euclidean distance transform in arbitrary dimensions," International Conference on Image Processing and its Applications, 1992 [27] http://www.itl.nist.gov/div897/sqg/dads/HTML/euclidndstnc.html
|