Sciweavers

523 search results - page 92 / 105
» Nodes Localization through Data Fusion in Sensor Network
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
PODS
2005
ACM
128views Database» more  PODS 2005»
14 years 9 months ago
Operator placement for in-network stream query processing
In sensor networks, data acquisition frequently takes place at lowcapability devices. The acquired data is then transmitted through a hierarchy of nodes having progressively incre...
Utkarsh Srivastava, Kamesh Munagala, Jennifer Wido...
ESAS
2007
Springer
14 years 3 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
SENSYS
2006
ACM
14 years 2 months ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
IOT
2010
13 years 6 months ago
A resource oriented architecture for the Web of Things
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Dominique Guinard, Vlad Trifa, Erik Wilde