Sciweavers

323 search results - page 51 / 65
» Strong barrier coverage of wireless sensor networks
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
IAT
2009
IEEE
14 years 2 months ago
Simulating BDI-Based Wireless Sensor Networks
—“Autonomic systems” merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing...
Alexis Morris, Paolo Giorgini, Sameh Abdel-Naby
DCOSS
2007
Springer
14 years 1 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
CDC
2008
IEEE
198views Control Systems» more  CDC 2008»
14 years 2 months ago
Performance analysis of different routing protocols in Wireless Sensor Networks for real-time estimation
— In this paper we analyze the performance of two different routing protocols specifically designed for Wireless Sensor Networks (WSNs) for real-time estimation, control, and mo...
Damiano Varagnolo, Phoebus Chen, Luca Schenato, Sh...
TWC
2008
138views more  TWC 2008»
13 years 7 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng