Sciweavers

762 search results - page 74 / 153
» Characterizing flows in large wireless data networks
Sort
View
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
13 years 10 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
CN
2004
111views more  CN 2004»
13 years 7 months ago
Edge-to-edge measurement-based distributed network monitoring
Continuous monitoring of a network domain poses several challenges. First, routers of a network domain need to be polled periodically to collect statistics about delay, loss, and ...
Ahsan Habib, Maleq Khan, Bharat K. Bhargava
CASES
2009
ACM
14 years 2 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks
PERCOM
2007
ACM
14 years 7 months ago
Exploring Non Uniform Quality of Service for Extending WSN Lifetime
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
Anna Egorova-Forster, Amy L. Murphy
ICNP
2006
IEEE
14 years 2 months ago
Benefit-based Data Caching in Ad Hoc Networks
—Data caching can significantly improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage. However, designing e...
Bin Tang, Himanshu Gupta, Samir R. Das