Sciweavers

527 search results - page 76 / 106
» Distributed Source Coding in Dense Sensor Networks
Sort
View
MOBICOM
2009
ACM
14 years 3 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
DSOM
2003
Springer
14 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
EUC
2005
Springer
14 years 2 months ago
Ubiquitous Computing: Challenges in Flexible Data Aggregation
Abstract. A dramatic increase of event monitoring capabilities by wireless sensors requires new, more sophisticated, event correlation over time and space. This new paradigm implie...
Eiko Yoneki, Jean Bacon
GLOBECOM
2010
IEEE
13 years 6 months ago
ATMA: Advertisement-Based TDMA Protocol for Bursty Traffic in Wireless Sensor Networks
Energy conservation is one of the primary goals of the majority of MAC protocols designed for wireless sensor networks. In Sensor-MAC (S-MAC), one of the first MAC protocols design...
Surjya Sarathi Ray, Ilker Demirkol, Wendi Rabiner ...
ADHOC
2005
143views more  ADHOC 2005»
13 years 8 months ago
Active query forwarding in sensor networks
While sensor networks are going to be deployed in diverse application specific contexts, one unifying view is to treat them essentially as distributed databases. The simplest mech...
Narayanan Sadagopan, Bhaskar Krishnamachari, Ahmed...