Sciweavers

3971 search results - page 720 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
ADHOCNOW
2006
Springer
14 years 4 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
RTCSA
2009
IEEE
14 years 5 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
WSTFEUS
2003
IEEE
14 years 3 months ago
DOLPHIN: An Autonomous Indoor Positioning System in Ubiquitous Computing Environment
Determining physical location of indoor objects is one of the key issues in development of context-aware applications in ubiquitous computing environment. This is mainly because c...
Yasuhiro Fukuju, Masateru Minami, Hiroyuki Morikaw...
MIDDLEWARE
2005
Springer
14 years 4 months ago
Context aware sensornet
Advances in MEMS technology, wireless communications, and digital electronics have enabled the development of low-cost, low-power, multifunctional sensor nodes that integrating th...
Huaifeng Qin, Xingshe Zhou
SENSYS
2010
ACM
13 years 8 months ago
Surviving wi-fi interference in low power ZigBee networks
Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly...
Chieh-Jan Mike Liang, Bodhi Priyantha, Jie Liu, An...