Sciweavers

2189 search results - page 101 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
224
Voted
PERCOM
2010
ACM
14 years 10 months ago
Local map generation using position and communication history of mobile nodes
In this paper, we propose an algorithm to estimate 2D shapes and positions of obstacles such as buildings using GPS and wireless communication history of mobile nodes. Our algorith...
Shinichi Minamimoto, Sae Fujii, Hirozumi Yamaguchi...
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
15 years 9 months ago
Preserving Area Coverage in Wireless Sensor Networks by Using Surface Coverage Relay Dominating Sets
— Sensor networks consist of autonomous nodes with limited battery and of base stations with theoritical infinite energy. Nodes can be sleep to extend the lifespan of the networ...
Jean Carle, Antoine Gallais, David Simplot-Ryl
SASN
2006
ACM
15 years 10 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
16 years 4 months ago
Energy and rate based MAC protocol for wireless sensor networks
Abstract-- Sensor networks are typically unattended because of their deployment in hazardous, hostile or remote environments. This makes the problem of conserving energy at individ...
Rajgopal Kannan, Ramaraju Kalidindi, S. Sitharama ...
PERVASIVE
2008
Springer
15 years 3 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie