Sciweavers

723 search results - page 121 / 145
» Geographic routing with limited information in sensor networ...
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
VLDB
2005
ACM
110views Database» more  VLDB 2005»
14 years 1 months ago
U-DBMS: A Database System for Managing Constantly-Evolving Data
In many systems, sensors are used to acquire information from external environments such as temperature, pressure and locations. Due to continuous changes in these values, and lim...
Reynold Cheng, Sarvjeet Singh, Sunil Prabhakar
MOBIHOC
2007
ACM
14 years 7 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
ICRA
1994
IEEE
154views Robotics» more  ICRA 1994»
14 years 4 days ago
The Network Data Delivery Service: Real-Time Data Connectivity for Distributed Control Applications
The Network Data Delivery Service NDDS is a novel network data-sharing system. NDDS builds on the model of information producers sources and consumers sinks. Producers generate da...
Gerardo Pardo-Castellote, Stanley A. Schneider
WSNA
2003
ACM
14 years 1 months ago
Proximity interactions between wireless sensors and their application
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...