Sciweavers

11927 search results - page 199 / 2386
» Wireless Sensor Networks
Sort
View
WINET
2010
179views more  WINET 2010»
15 years 22 days ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
122
Voted
SIGSOFT
2010
ACM
15 years 7 days ago
Software engineering and wireless sensor networks: happy marriage or consensual divorce?
The development of wireless sensor networks (WSNs) software today is tackled by a code-and-fix process that relies solely on the primitive constructs provided by the operating sys...
Gian Pietro Picco
129
Voted
DCOSS
2008
Springer
15 years 4 months ago
Decoding Code on a Sensor Node
Abstract. Wireless sensor networks come of age and start moving out of the laboratory into the field. As the number of deployments is increasing the need for an efficient and relia...
Pascal von Rickenbach, Roger Wattenhofer
MASS
2010
110views Communications» more  MASS 2010»
15 years 8 days ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
SAC
2009
ACM
15 years 9 months ago
Lightweight monitoring of sensor software
Wireless sensors are very small computers, and understanding the timing and behavior of software written for them is crucial to ensuring that they perform correctly. This paper ou...
Mustafa Hammad, Jonathan Cook