Sciweavers

25316 search results - page 60 / 5064
» Computational sensor networks
Sort
View
ISORC
2007
IEEE
14 years 4 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee
DSN
2004
IEEE
14 years 1 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
ICDCS
2008
IEEE
14 years 4 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
LCN
2008
IEEE
14 years 4 months ago
Beasties: Simple wireless sensor nodes
—Interest in wireless sensor nodes has escalated over the past 10 years bringing with it a plethora of sensor hardware as well as protocol, algorithmic and application research. ...
Asher Hoskins, Julie A. McCann
ICPADS
2008
IEEE
14 years 4 months ago
Integrating Sensor Streams in pHealth Networks
Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Mark Roantree, Dónall McCann, Niall Moyna