Sciweavers

510 search results - page 86 / 102
» Sensor Selection Heuristic in Sensor Networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 7 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
QSHINE
2005
IEEE
14 years 1 months ago
Retransmission Strategies for Wireless Connections with Resource-Limited Devices
Protocols designed to provide error-free communications over lossy links, at both data link and transport layers, commonly employ the idea of sliding windows, which is based on th...
Lavy Libman
ICECCS
2010
IEEE
120views Hardware» more  ICECCS 2010»
13 years 8 months ago
Maintaining Stable Node Populations in Long-Lifetime Sensornets
Sensornets provide coverage of physical phenomena over extended periods, perhaps months or years. However, active nodes may deplete finite batteries within days, and are prone to...
Jonathan Tate, Iain Bate
TPDS
2008
196views more  TPDS 2008»
13 years 7 months ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...
ICDE
2004
IEEE
148views Database» more  ICDE 2004»
14 years 9 months ago
Approximate Selection Queries over Imprecise Data
We examine the problem of evaluating selection queries over imprecisely represented objects. Such objects are used either because they are much smaller in size than the precise on...
Iosif Lazaridis, Sharad Mehrotra