Sciweavers

4189 search results - page 192 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
151views Communications» more  ICC 2007»
14 years 2 months ago
Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks
- Mobile sinks can be a viable solution to solve the problem that energy consumption is not balanced for all the sensor nodes in Wireless Sensor Networks (WSNs). Frequent location ...
Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Hsi...
ICDCS
2007
IEEE
14 years 2 months ago
Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and produc...
Yunhao Liu, Mo Li
ICPADS
2007
IEEE
14 years 2 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
IEEEIA
2009
13 years 6 months ago
Agent Based Multipath Routing in Wireless Sensor Networks
recently, mobile agents have been used to solve many problems in wireless sensor networks. Agents are usually transferred from a node to another to aggregate the sensed data and si...
Rabie A. Ramadan
ICASSP
2011
IEEE
13 years 21 hour ago
Distributed LCMV beamforming in wireless sensor networks with node-specific desired signals
We consider distributed linearly constrained minimum variance (LCMV) beamforming in a wireless sensor network. Each node computes an LCMV beamformer with node-specific constraint...
Alexander Bertrand, Marc Moonen