Sciweavers

914 search results - page 138 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
APSCC
2008
IEEE
14 years 2 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
ISPAN
2005
IEEE
14 years 1 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
ADHOCNOW
2009
Springer
14 years 2 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...
INFOCOM
2011
IEEE
12 years 11 months ago
Optimal multiple-coverage of sensor networks
—In wireless sensor networks, multiple-coverage, in which each point is covered by more than one sensor, is often required to improve detection quality and achieve high fault tol...
Xiaole Bai, Ziqiu Yun, Dong Xuan, Biao Chen, Wei Z...
RTSS
2003
IEEE
14 years 1 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son