— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
In this paper we propose event-driven power management techniques for wireless sensor networks. To accomplish this we model a sensor network application as a set of application-spe...
Sang Hoon Lee, Byong-Ha Cho, Lynn Choi, Sun-Joong ...
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Abstract--If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; i...