Sciweavers

914 search results - page 43 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
13 years 9 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi

Lecture Notes
456views
15 years 6 months ago
Wireless and Mobile Networking
The lecture notes cover the following topics, CSE 574S Wireless and Mobile Networking: Course Overview, Wireless Networking Trends, A Review of Key Wireless Physical Layer Co...
Raj Jain
MOBIHOC
2007
ACM
14 years 7 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
PERCOM
2005
ACM
14 years 7 months ago
Mobile data collection in sensor networks: The TinyLime
In this paper we describe TinyLime, a novel middleware for wireless sensor networks that departs from the traditional setting where sensor data is collected by a central monitorin...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
GISCIENCE
2008
Springer
186views GIS» more  GISCIENCE 2008»
13 years 9 months ago
Detecting Topological Change Using a Wireless Sensor Network
Dynamic geographic phenomena, such as forest fires and oil spills, can have dire environmental, sociopolitical, and economic consequences. Mitigating, if not preventing such events...
Christopher Farah, Cheng Zhong, Michael F. Worboys...