Sciweavers

359 search results - page 14 / 72
» Programming wireless sensor networks with logical neighborho...
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 7 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
SIGOPSE
2004
ACM
14 years 24 days ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...
SAC
2009
ACM
14 years 2 months ago
Integrating standardized transaction protocols in service-oriented wireless sensor networks
Despite much research in the area of wireless sensor networks in recent years, the programming of sensor nodes is still time-consuming and tedious. A new paradigm which seems to b...
Christoph Reinke, Nils Hoeller, Jana Neumann, Sven...
CSE
2009
IEEE
14 years 2 days ago
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks
— this paper proposes a distributed routing protocol for ad hoc sensor networks which uses Fuzzy Logic. Each sensor uses a Fuzzy decision making process to find the best Cluster ...
Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thom...
ICCCN
2007
IEEE
14 years 1 months ago
Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
—A robust filter-based approach is proposed for wireless sensor networks for detecting contours of a signal distribution over a 2-dimensional region. The motivation for contour d...
Hadi Alasti, William A. Armstrong, Asis Nasipuri