Sciweavers

4189 search results - page 177 / 838
» On the Security of Wireless Sensor Networks
Sort
View
TMC
2010
155views more  TMC 2010»
13 years 6 months ago
Maximizing the Lifetime of a Barrier of Wireless Sensors
—To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so tha...
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...
MUE
2007
IEEE
71views Multimedia» more  MUE 2007»
14 years 2 months ago
Query Predicate Preprocessing in Wireless Sensor Networks
With the developments of related techniques in telecommunication and computer sciences, wireless sensor networks have been used more and more widely. While sensor nodes in wireles...
Min Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee,...
IJDSN
2007
111views more  IJDSN 2007»
13 years 8 months ago
Architecture of Wireless Sensor Networks with Mobile Sinks: Multiple Access Case
We propose to develop wireless Sensor Networks with Mobile Sinks (MSSN), under high sensor node density, where multiple sensor nodes need to share one single communication channel...
Liang Song, Dimitrios Hatzinakos
ALGOSENSORS
2004
Springer
14 years 1 months ago
Constrained Flow Optimization with Applications to Data Gathering in Sensor Networks
We focus on data gathering problems in energy-constrained wireless sensor networks. We study store-and-gather problems where data are locally stored on the sensors before the data ...
Bo Hong, Viktor K. Prasanna
ASWEC
2006
IEEE
14 years 2 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...