Sciweavers

2172 search results - page 140 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
SECON
2007
IEEE
14 years 3 months ago
INPoD: In-Network Processing over Sensor Networks based on Code Design
—In this paper, we develop a joint Network Coding (NC)-channel coding error-resilient sensor-network approach that performs In-Network Processing based on channel code Design (IN...
Kiran Misra, Shirish S. Karande, Hayder Radha
DC
2008
13 years 8 months ago
Contention-free MAC protocols for asynchronous wireless sensor networks
A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of a MAC protocol are: it should be contention-free (avoid collisio...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
IPPS
2007
IEEE
14 years 3 months ago
Optimal Energy Balanced Data Gathering in Wireless Sensor Networks
Unbalanced energy consumption is an inherent problem in wireless sensor networks where some nodes may be overused and die out early, resulting in a short network lifetime. In this...
Haibo Zhang, Hong Shen, Yasuo Tan
ICDE
2009
IEEE
158views Database» more  ICDE 2009»
14 years 11 months ago
KSpot: Effectively Monitoring the K Most Important Events in a Wireless Sensor Network
This demo presents a graphical user interface and ranking system, coined KSpot, for effectively monitoring the K highest-ranked answers to a query Q in a Wireless Sensor Network. K...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, M...