Sciweavers

283 search results - page 23 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
MOBIHOC
2006
ACM
14 years 7 months ago
Fundamental scaling laws for energy-efficient storage and querying in wireless sensor networks
We use a constrained optimization framework to derive fundamental scaling laws for both unstructured sensor networks (which use blind sequential search for querying) and structure...
Joon Ahn, Bhaskar Krishnamachari
ICPP
2009
IEEE
14 years 2 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...
TRIDENTCOM
2008
IEEE
14 years 2 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
WISEC
2010
ACM
14 years 15 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
IJSNET
2010
117views more  IJSNET 2010»
13 years 2 months ago
Reaction-diffusion based autonomous control of wireless sensor networks
Abstract: Taking into account requirements of sensor networks, we need fully-distributed and selforganising control mechanisms which are scalable to the size of a network, robust t...
Katsuya Hyodo, Naoki Wakamiya, Etsushi Nakaguchi, ...