Sciweavers

858 search results - page 103 / 172
» User Authentication in Sensor Networks
Sort
View
253
Voted
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
16 years 2 months ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
149
Voted
PDP
2009
IEEE
15 years 9 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
112
Voted
ICDCS
2005
IEEE
15 years 8 months ago
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications
Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new midd...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
141
Voted
SECON
2007
IEEE
15 years 8 months ago
Decentralized Multiuser Diversity with Cooperative Relaying in Wireless Sensor Networks
— Multiuser diversity is a phenomenon caused by channel variations among different users in a wireless network. Cooperative relaying provides another form of diversity due to the...
Sam Vakil, Ben Liang
106
Voted
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 9 months ago
Distributed Optimization for Utility-Energy Tradeoff in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) are energyconstrained in nature, in this paper, we formulate the problem of data transport in sensor networks as a network utility maxim...
Shengbin Liao, Wenqing Cheng, Wei Liu, Zongkai Yan...