Sciweavers

2189 search results - page 117 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
ICDCN
2009
Springer
15 years 10 months ago
Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
ICUMT
2009
15 years 1 months ago
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly addres...
Abdallah Makhoul, Rachid Saadi, CongDuc Pham
CSREAPSC
2006
15 years 5 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
PERCOM
2007
ACM
16 years 3 months ago
A State-Based Programming Model and System for Wireless Sensor Networks
Sensor networks are one important building block towards the realisation of context-aware applications. Suitable communication protocols and middleware solutions are necessary to ...
Urs Bischoff, Gerd Kortuem
DC
2008
15 years 3 months ago
Contention-free MAC protocols for asynchronous wireless sensor networks
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of a MAC protocol are: it should be contention-free (avoid collisio...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...