Sciweavers

1051 search results - page 78 / 211
» Secure Continuity for Sensor Networks
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks
Abstract—Many sensor network applications are tightly coupled with the geometric environment where the sensor nodes are deployed. The topological skeleton extraction has shown gr...
Hongbo Jiang, Wenping Liu, Dan Wang, Chen Tian, Xi...
DEXA
2010
Springer
138views Database» more  DEXA 2010»
15 years 2 months ago
Enrichment of Raw Sensor Data to Enable High-Level Queries
Abstract. Sensor networks are increasingly used across various application domains. Their usage has the advantage of automated, often continuous, monitoring of activities and event...
Kenneth Conroy, Mark Roantree
DCOSS
2006
Springer
15 years 7 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan
ISPA
2005
Springer
15 years 9 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
157
Voted
DCOSS
2009
Springer
15 years 10 months ago
Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proposed for a large variety of applications. As the number of applications of sensor networks continue to grow, the number of users in se...
Hui Ling, Taieb Znati