Sciweavers

165 search results - page 26 / 33
» A Survey on Key Management Strategies for Different Applicat...
Sort
View
CIDR
2007
111views Algorithms» more  CIDR 2007»
13 years 9 months ago
The Case for a Signal-Oriented Data Stream Management System
Sensors capable of sensing phenomena at high data rates—on the order of tens to hundreds of thousands of samples per second—are useful in many industrial, civil engineering, s...
Lewis Girod, Yuan Mei, Ryan Newton, Stanislav Rost...
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 5 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
ICDCS
2011
IEEE
12 years 7 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
IPSN
2005
Springer
14 years 1 months ago
Perpetual environmentally powered sensor networks
— Environmental energy is an attractive power source for low power wireless sensor networks. We present Prometheus, a system that intelligently manages energy transfer for perpet...
Xiaofan Jiang, Joseph Polastre, David E. Culler
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
13 years 11 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska