Sciweavers

858 search results - page 46 / 172
» User Authentication in Sensor Networks
Sort
View
ICC
2007
IEEE
245views Communications» more  ICC 2007»
14 years 2 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
INFOCOM
2006
IEEE
14 years 2 months ago
Distributed Navigation Algorithms for Sensor Networks
— We propose efficient distributed algorithms to aid navigation of a user through a geographic area covered by sensors. The sensors sense the level of danger at their locations ...
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash ...
EWSN
2006
Springer
14 years 8 months ago
Semantic Streams: A Framework for Composable Semantic Interpretation of Sensor Data
We present a framework called Semantic Streams that allows users to pose declarative queries over semantic interpretations of sensor data. For example, instead of querying raw magn...
Kamin Whitehouse, Feng Zhao, Jie Liu
JSAC
2006
127views more  JSAC 2006»
13 years 8 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
SIBGRAPI
2005
IEEE
14 years 2 months ago
Ridge-Based Fingerprint Matching Using Hough Transform
Despite the efficacy of minutia-based fingerprint matching techniques for good-quality images captured by optical sensors, minutia-based techniques do not often perform so well on...
Aparecido Nilceu Marana, Anil K. Jain