Sciweavers

914 search results - page 81 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
SAINT
2008
IEEE
14 years 2 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
MOBICOM
2009
ACM
14 years 2 months ago
Lifetime and coverage guarantees through distributed coordinate-free sensor activation
Wireless Sensor Networks are emerging as a key sensing technology, with diverse military and civilian applications. In these networks, a large number of sensors perform distribute...
Gaurav S. Kasbekar, Yigal Bejerano, Saswati Sarkar
TWC
2008
113views more  TWC 2008»
13 years 7 months ago
Two-dimensional coded classification schemes in wireless sensor networks
Abstract-- This work proposes a novel fault-tolerant classification system based on distributed detection and two-dimensional channel coding. A rule is then derived to reduce the s...
Hung-Ta Pai, Yunghsiang S. Han, Jing-Tian Sung
SENSYS
2010
ACM
13 years 5 months ago
Locating sensors in the wild: pursuit of ranging quality
Localization is a fundamental issue of wireless sensor networks that has been extensively studied in the literature. The real-world experience from GreenOrbs, a sensor network sys...
Wei Xi, Yuan He, Yunhao Liu, Jizhong Zhao, Lufeng ...