Sciweavers

914 search results - page 47 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
MOBILIGHT
2010
13 years 5 months ago
Improving Wireless Sensor Network Resilience with the INTERSECTION Framework
This paper investigates the INTERSECTION Framework's ability to build resilience into Wireless Sensor Networks. The framework's general details are examined along with ge...
Gareth Tyson, Adam T. Lindsay, Steven Simpson, Dav...
GLOBECOM
2008
IEEE
13 years 9 months ago
Mobile Solution for Three-Tier Biofeedback Data Acquisition and Processing
— Wireless sensor networks span from military applications into everyday life. Body sensor networks greatly benefit from wireless sensor networks to answer the biofeedback challe...
Orlando R. E. Pereira, Paulo A. C. S. Neves, Joel ...
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
INFOCOM
2003
IEEE
14 years 1 months ago
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
— A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. The data ...
Seema Bandyopadhyay, Edward J. Coyle
ICC
2008
IEEE
162views Communications» more  ICC 2008»
14 years 2 months ago
Self-Orienting Wireless Multimedia Sensor Networks for Maximizing Multimedia Coverage
— The performance of a wireless multimedia sensor network (WMSN) is tightly coupled with the pose of individual multimedia sensors. In particular, orientation of an individual mu...
Nurcan Tezcan, Wenye Wang