Sciweavers

1158 search results - page 146 / 232
» Mobile object tracking in wireless sensor networks
Sort
View
RTCSA
2005
IEEE
14 years 3 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
WCNC
2008
IEEE
14 years 4 months ago
Bluetooth 2.1 based Emergency Data Delivery System in HealthNet
Abstract—The interests in health care have considerably increased these days as the aging population becomes larger. Health care has grown to the one of most active research area...
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dae-...
ICC
2008
IEEE
117views Communications» more  ICC 2008»
14 years 4 months ago
Proactive Power Optimization of Sensor Networks
—We propose a reduced-complexity genetic algorithm for dynamic deployment of resource constrained multi-hop mobile sensor networks. The goal of this paper is to achieve optimal c...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
14 years 2 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
WIMOB
2008
IEEE
14 years 4 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...