Sciweavers

2333 search results - page 311 / 467
» Power-aware Node Deployment in Wireless Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
15 years 11 months ago
ARQ with Implicit and Explicit ACKs in Wireless Sensor Networks
—A common application of unattended sensor networks (WSN) is low data rate streaming from many scattered sensors to one or more sink nodes. To meet the stringent requirement of p...
Zvi Rosberg, Ren Ping Liu, Alex Y. Dong, Tuan D. L...
JPDC
2007
112views more  JPDC 2007»
15 years 4 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
MOBISYS
2009
ACM
16 years 5 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
IPSN
2004
Springer
15 years 10 months ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
DCOSS
2011
Springer
14 years 4 months ago
Construction of connected dominating sets in large-scale MANETs exploiting self-stabilization
—Available algorithms for the distributed construction of connected dominating sets in mobile ad hoc networks are inapplicable or suffer from a high complexity. This is mainly du...
Stefan Unterschutz, Volker Turau