Sciweavers

703 search results - page 114 / 141
» Coverage Analysis for Wireless Sensor Networks
Sort
View
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
ICDCS
2009
IEEE
14 years 4 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
ADHOCNOW
2008
Springer
14 years 2 months ago
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks
Energy-efficient query dissemination plays an important role for the lifetime of sensor networks. In this work, we consider probabilistic flooding for query dissemination and deve...
Zinaida Benenson, Markus Bestehorn, Erik Buchmann,...
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
14 years 2 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
SENSYS
2005
ACM
14 years 1 months ago
Packet combining in sensor networks
This paper presents the Simple Packet Combining (SPaC) error-correction scheme for wireless sensor networks. Nodes buffer corrupt packets, and when two or more corrupt versions o...
Henri Dubois-Ferrière, Deborah Estrin, Mart...