Sciweavers

914 search results - page 77 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
NETWORK
2006
302views more  NETWORK 2006»
13 years 7 months ago
Node clustering in wireless sensor networks: recent developments and deployment challenges
The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balan...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
ISPA
2007
Springer
14 years 2 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
PE
2008
Springer
120views Optimization» more  PE 2008»
13 years 7 months ago
A queueing approach to optimal resource replication in wireless sensor networks
We develop a queueing model for analyzing resource replication strategies in wireless sensor networks. The model can be used to minimize either the total transmission rate of the ...
Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. ...
SENSYS
2003
ACM
14 years 1 months ago
TOSSIM: accurate and scalable simulation of entire tinyOS applications
Accurate and scalable simulation has historically been a key enabling factor for systems research. We present TOSSIM, a simulator for TinyOS wireless sensor networks. By exploitin...
Philip Levis, Nelson Lee, Matt Welsh, David E. Cul...