Sciweavers

3971 search results - page 708 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 5 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
GLOBECOM
2008
IEEE
14 years 5 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar
NTMS
2008
IEEE
14 years 5 months ago
An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment Monitoring
—In wireless sensor networks (WSNs), the frequency of sensing and data gathering depends on application requirements and surrounding conditions. In this paper, we propose a data ...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...
COMCOM
2006
120views more  COMCOM 2006»
13 years 10 months ago
Energy efficient routing and scheduling for real-time data aggregation in WSNs
In this paper, we study the problem of constructing an energy efficient data aggregation tree for data gathering in wireless sensor networks. We consider a real-time scenario wher...
Hongwei Du, Xiaodong Hu, Xiaohua Jia
ISMAR
2003
IEEE
14 years 4 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...