Sciweavers

1355 search results - page 127 / 271
» A Taxonomy of Localization Schemes for Wireless Sensor Netwo...
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
GLOBECOM
2008
IEEE
14 years 2 months ago
Distributed Regression in Sensor Networks with a Reduced-Order Kernel Model
Abstract—Over the past few years, wireless sensor networks received tremendous attention for monitoring physical phenomena, such as the temperature field in a given region. Appl...
Paul Honeine, Mehdi Essoloh, Cédric Richard...
GLOBECOM
2009
IEEE
14 years 2 months ago
MRSD: Multirate-Based Service Differentiation for the IEEE 802.15.4 Wireless Sensor Network
—The IEEE 802.15.4 standard has no provisions for rate sensitive applications because of its ability to operate in pure CSMA/CA or TDMA modes. Some operating scenarios for rate-s...
Chewoo Na, Yaling Yang
INFOCOM
2008
IEEE
14 years 2 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
AINA
2009
IEEE
14 years 2 months ago
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...