Sciweavers

3971 search results - page 709 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
IJRFITA
2007
114views more  IJRFITA 2007»
13 years 10 months ago
Semi-passive RFID and beyond: steps towards automated quality tracing in the food chain
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
Reiner Jedermann, Walter Lang
GLOBECOM
2008
IEEE
13 years 11 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
ATAL
2008
Springer
14 years 23 days ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
13 years 8 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...
DCOSS
2009
Springer
14 years 2 months ago
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While M...
Weijia Li, Youtao Zhang, Bruce Childers