Sciweavers

914 search results - page 158 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Integrating concurrency control and energy management in device drivers
Energy management is a critical concern in wireless sensornets. Despite its importance, sensor network operating systems today provide minimal energy management support, requiring...
Kevin Klues, Vlado Handziski, Chenyang Lu, Adam Wo...
MOBIHOC
2008
ACM
14 years 7 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler
SENSYS
2009
ACM
14 years 2 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
NETWORKING
2011
12 years 10 months ago
The Problem of Sensing Unused Cellular Spectrum
Abstract. Sensing mechanisms that estimate the occupancy of wireless spectrum are crucial to the success of approaches based on Dynamic Spectrum Access. In this paper, we present k...
Daniel Willkomm, Sridhar Machiraju, Jean Bolot, Ad...
GSN
2009
Springer
140views Sensor Networks» more  GSN 2009»
14 years 8 days ago
Estimation of Pollutant-Emitting Point-Sources Using Resource-Constrained Sensor Networks
We present an algorithm that makes an appropriate use of a Kalman filter combined with a geometric computation with respect to the localisation of a pollutant-emitting point sourc...
Michael Zoumboulakis, George Roussos