Sciweavers

5813 search results - page 108 / 1163
» Hotness-Aware Sensor Networks
Sort
View
180
Voted
ESAS
2007
Springer
15 years 6 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
COMCOM
2006
79views more  COMCOM 2006»
15 years 3 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
15 years 4 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
DMSN
2008
ACM
15 years 4 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
111
Voted
CN
2007
221views more  CN 2007»
15 years 2 months ago
Adaptive design optimization of wireless sensor networks using genetic algorithms
We present a multi-objective optimization methodology for self-organizing, adaptive wireless sensor network design and energy management, taking into consideration application-spe...
Konstantinos P. Ferentinos, Theodore A. Tsiligirid...