Sciweavers

322 search results - page 39 / 65
» Percentage Coverage Configuration in Wireless Sensor Network...
Sort
View
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 months ago
Robust Localization in Wireless Sensor Networks through the Revocation of Malicious Anchors
— In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves with the help of anchors that are pre-deployed in the network. Time of Arrival (ToA) is...
Satyajayant Misra, Guoliang Xue, Aviral Shrivastav...
ICDCS
2006
IEEE
14 years 1 months ago
Self-Protection for Wireless Sensor Networks
Wireless sensor networks have recently been suggested for many surveillance applications such as object monitoring, path protection, or area coverage. Since the sensors themselves...
Dan Wang, Qian Zhang, Jiangchuan Liu
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
14 years 2 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...
ICC
2007
IEEE
14 years 2 months ago
PERD: Polynomial-based Event Region Detection in Wireless Sensor Networks
We propose a Polynomial-based scheme that addresses the problem of Event Region Detection (PERD) for wireless sensor networks (WSNs). Nodes of an aggregation tree perform function ...
Torsha Banerjee, Demin Wang, Bin Xie, Dharma P. Ag...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy