Sciweavers

294 search results - page 24 / 59
» Query privacy in wireless sensor networks
Sort
View
GIS
2009
ACM
13 years 12 months ago
Opportunistic sampling in wireless sensor networks
In an active WSN where user queries are regularly processed, a significant proportion of nodes relay and overhear data generated by other nodes in the network. In this paper, we ...
Muhammad Umer, Egemen Tanin, Lars Kulik
SUTC
2008
IEEE
14 years 3 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
JPDC
2010
128views more  JPDC 2010»
13 years 7 months ago
Adaptive holistic scheduling for query processing in sensor networks
We observe two deficiencies of current query processing and scheduling techniques for sensor networks: (1) A query execution plan does not adapt to the hardware characteristics o...
Hejun Wu, Qiong Luo
RTAS
2002
IEEE
14 years 1 months ago
RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks
Large-scale wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from traditional networked sys...
Chenyang Lu, Brian M. Blum, Tarek F. Abdelzaher, J...
MDM
2009
Springer
149views Communications» more  MDM 2009»
14 years 3 months ago
ETC: Energy-Driven Tree Construction in Wireless Sensor Networks
Continuous queries in Wireless Sensor Networks (WSNs) are founded on the premise of Query Routing Tree structures (denoted as T), which provide sensors with a path to the querying...
Panayiotis Andreou, A. Pamboris, Demetrios Zeinali...