Sciweavers

431 search results - page 12 / 87
» On application of Host Identity Protocol in wireless sensor ...
Sort
View
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
14 years 3 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
TCS
2008
13 years 8 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
TELSYS
2010
174views more  TELSYS 2010»
13 years 3 months ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
IPSN
2003
Springer
14 years 1 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
PERCOM
2009
ACM
14 years 3 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott