Sciweavers

6122 search results - page 39 / 1225
» Securing network access in wireless sensor networks
Sort
View
ACISP
2005
Springer
14 years 1 months ago
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the ...
Phillip Pudney, Jill Slay
IPSN
2010
Springer
14 years 2 months ago
Low-power wireless IPv6 routing with ContikiRPL
Nicolas Tsiftes, Joakim Eriksson, Adam Dunkels
ISCIS
2004
Springer
14 years 29 days ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...