Sciweavers

914 search results - page 139 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ICCCN
2008
IEEE
14 years 2 months ago
Energy Minimization through Network Coding for Lifetime Constrained Wireless Networks
— Energy management is the key issue in the design and operation of wireless network applications like sensor networks, pervasive computing and ubiquitous computing where the net...
Nishanth Gaddam, Sudha Anil Gathala, David Lastine...
MOBISYS
2008
ACM
14 years 7 months ago
Brimon: a sensor network system for railway bridge monitoring
: Railway systems are critical in many regions, and can consist of several tens of thousands of bridges, being used over several decades. It is critical to have a system to monitor...
Kameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra...
ICRA
2008
IEEE
146views Robotics» more  ICRA 2008»
14 years 2 months ago
Exploration of an incremental suite of microscopic models for acoustic event monitoring using a robotic sensor network
— Simulation is frequently used in the study of multi-agent systems. Unfortunately, in many cases, it is not necessarily clear how faithfully the details of the simulated model r...
Christopher M. Cianci, Jim Pugh, Alcherio Martinol...
TDSC
2010
102views more  TDSC 2010»
13 years 6 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
ICPADS
2005
IEEE
14 years 1 months ago
Routing through Backbone Structures in Sensor Networks
Virtual infrastructures or backbones in wireless sensor networks reduce the communication overhead and energy consumption. In this paper, we present BackBone Routing (BBR), a nove...
Vamsi Paruchuri, Arjan Durresi, Mimoza Durresi, Le...