Sciweavers

376 search results - page 3 / 76
» Blocking Vulnerable Paths of Wireless Sensor Networks
Sort
View
ICDCS
2011
IEEE
12 years 7 months ago
The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory
—Routing is a critical operation in networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (“all-path”...
Yanhua Li, Zhi-Li Zhang, Daniel Boley
ISCIS
2004
Springer
14 years 21 days ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
DCOSS
2009
Springer
14 years 1 months ago
Performance of Bulk Data Dissemination in Wireless Sensor Networks
Wireless sensor networks (WSNs) have recently gained a great deal of attention as a topic of research, with a wide range of applications being explored. Bulk data dissemination is ...
Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, Yunhao Li...
ICCSA
2005
Springer
14 years 26 days ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
SENSYS
2003
ACM
14 years 18 days ago
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
Sensor networks not only have the potential to change the way we use, interact with, and view computers, but also the way we use, interact with, and view the world around us. In o...
Giacomino Veltri, Qingfeng Huang, Gang Qu, Miodrag...