Sciweavers

1565 search results - page 274 / 313
» Randomized Self-stabilizing Algorithms for Wireless Sensor N...
Sort
View
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
14 years 18 days ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 3 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
IJDSN
2006
114views more  IJDSN 2006»
13 years 8 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 3 months ago
Generalized multicircumcenter trajectories for optimal design under near-independence
This work deals with trajectory optimization for a network of robotic sensors sampling a spatio-temporal random field. We examine the problem of minimizing over the space of networ...
Rishi Graham, Jorge Cortés
EWSN
2008
Springer
14 years 8 months ago
Tracking Dynamic Boundary Fronts Using Range Sensors
Abstract. We examine the problem of tracking dynamic boundaries occurring in natural phenomena using range sensors. Two main challenges of the boundary tracking problem are energy-...
Subhasri Duttagupta, Krithi Ramamritham, Purushott...