Sciweavers

703 search results - page 74 / 141
» Coverage Analysis for Wireless Sensor Networks
Sort
View
WS
2004
ACM
14 years 2 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
IPCCC
2007
IEEE
14 years 3 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
WWIC
2007
Springer
156views Communications» more  WWIC 2007»
14 years 3 months ago
ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to p...
Tran Thanh Dai, Choong Seon Hong
CN
2006
117views more  CN 2006»
13 years 9 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
ISPA
2007
Springer
14 years 3 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu