Sciweavers

2099 search results - page 131 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
13 years 11 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
IPPS
2008
IEEE
14 years 3 months ago
A wireless sensor network based closed-loop system for subsurface contaminant plume monitoring
A closed-loop contaminant plume monitoring system is being developed that integrates wireless sensor network based monitoring with numerical models for subsurface plumes. The syst...
Qi Han, Anura P. Jayasumana, Tissa H. Illangasekar...
IADIS
2003
13 years 10 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
COMSWARE
2007
IEEE
14 years 3 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...