Sciweavers

1061 search results - page 119 / 213
» Voice over Sensor Networks
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
DCOSS
2007
Springer
13 years 12 months ago
Efficient Computation of Minimum Exposure Paths in a Sensor Network Field
The exposure of a path p is a measure of the likelihood that an object traveling along p is detected by a network of sensors and it is formally defined as an integral over all poin...
Hristo Djidjev
PDP
2009
IEEE
14 years 2 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
AINA
2008
IEEE
14 years 2 months ago
Performance Analysis of Data Delivery Schemes for a Multi-Sink Wireless Sensor Network
Wireless sensor networks are expected to be deployed in harsh environments characterised by extremely poor and fluctuating channel conditions. With the commonly adopted single-si...
Hwee Pink Tan, Adriana Felicia Gabor, Winston Khoo...
SRDS
2008
IEEE
14 years 2 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...