Application of Reed-Muller Codes for Localization of Malicious Nodes

Anna Kacewicz, Stephen B. Wicker. Application of Reed-Muller Codes for Localization of Malicious Nodes. In Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. pages 1-7, IEEE, 2010. [doi]

@inproceedings{KacewiczW10,
  title = {Application of Reed-Muller Codes for Localization of Malicious Nodes},
  author = {Anna Kacewicz and Stephen B. Wicker},
  year = {2010},
  doi = {10.1109/ICC.2010.5501749},
  url = {http://dx.doi.org/10.1109/ICC.2010.5501749},
  researchr = {https://researchr.org/publication/KacewiczW10},
  cites = {0},
  citedby = {0},
  pages = {1-7},
  booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010},
  publisher = {IEEE},
  isbn = {978-1-4244-6402-9},
}