Sciweavers

914 search results - page 86 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ADHOCNOW
2008
Springer
14 years 2 months ago
DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks
Abstract. A current challenge in wireless sensor networks is the positioning of sensor nodes for indoor environments without dedicated hardware. Especially in this domain, many app...
Freddy López Villafuerte, Jochen H. Schille...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
14 years 8 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
SUTC
2010
IEEE
13 years 11 months ago
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks
Abstract—A prominent application of Wireless Sensor Networks is the monitoring of physical phenomena. The value of the monitored attributes naturally depends on the accuracy of t...
Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri
INFOCOM
2003
IEEE
14 years 1 months ago
Robust Location Detection in Emergency Sensor Networks
— We propose a new framework for providing robust location detection in emergency response systems, based on the theory of identifying codes. The key idea of this approach is to ...
Saikat Ray, Rachanee Ungrangsi, Francesco De Pelle...
IEEEARES
2007
IEEE
14 years 2 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...