Sciweavers

5813 search results - page 114 / 1163
» A wake-on sensor network
Sort
View
SSDBM
2006
IEEE
111views Database» more  SSDBM 2006»
14 years 4 months ago
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
MDM
2010
Springer
250views Communications» more  MDM 2010»
14 years 5 days ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
GLOBECOM
2010
IEEE
13 years 8 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
INFOCOM
2007
IEEE
14 years 4 months ago
Shape Segmentation and Applications in Sensor Networks
—Many sensor network protocols in the literature implicitly assume that sensor nodes are deployed uniformly inside a simple geometric region. When the real deployment deviates fr...
Xianjin Zhu, Rik Sarkar, Jie Gao