Sciweavers

247 search results - page 23 / 50
» MAC Protocol Engine for Sensor Networks
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
WIOPT
2005
IEEE
14 years 1 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
DMSN
2006
ACM
14 years 1 months ago
Network scheduling for data archiving applications in sensor networks
Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An examp...
Yong Yao, S. M. Nazrul Alam, Johannes Gehrke, Serg...
VTC
2010
IEEE
242views Communications» more  VTC 2010»
13 years 5 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
CISSE
2008
Springer
13 years 9 months ago
Modified LEACH - Energy Efficient Wireless Networks Communication
Many algorithms and techniques were proposed to increase the efficiency of Sensor Networks. Due to high restrictions of this kind of networks, where the resources are limited, many...
Mohammed Abuhelaleh, Khaled M. Elleithy, Thabet M....