Sciweavers

331 search results - page 41 / 67
» Routing through Backbone Structures in Sensor Networks
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
TON
2010
147views more  TON 2010»
13 years 5 months ago
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach
—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
Tao Shu, Marwan Krunz
INFOCOM
2007
IEEE
14 years 1 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
IJSNET
2008
114views more  IJSNET 2008»
13 years 7 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
AICCSA
2005
IEEE
164views Hardware» more  AICCSA 2005»
14 years 1 months ago
Efficient aggregation of delay-constrained data in wireless sensor networks
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef