Sciweavers

914 search results - page 117 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
IJSNET
2006
106views more  IJSNET 2006»
13 years 7 months ago
Efficient anonymity schemes for clustered wireless sensor networks
: In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS...
Satyajayant Misra, Guoliang Xue
FM
2009
Springer
163views Formal Methods» more  FM 2009»
14 years 12 days ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
COMSWARE
2007
IEEE
14 years 2 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit
ICASSP
2010
IEEE
13 years 8 months ago
Green modulation in dense Wireless Sensor Networks
Due to unique characteristics of sensor nodes, choosing an energyefficient modulation scheme with low-complexity implementation (refereed to as green modulation) is a critical fa...
Jamshid Abouei, Konstantinos N. Plataniotis, Subba...
ICDCS
2012
IEEE
11 years 10 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...