Sciweavers

ICW
2005
IEEE
171views Communications» more  ICW 2005»
14 years 5 months ago
State-Driven Energy Optimization in Wireless Sensor Networks
Most sensor network applications require quality of service guarantees on a network-wide basis, suggesting the need for global network cost optimization. The dynamic and nonunifor...
Raja Jurdak, Pierre Baldi, Cristina Videira Lopes
ICW
2005
IEEE
155views Communications» more  ICW 2005»
14 years 5 months ago
A Coordination Middleware for Wireless Sensor Networks
Middleware development in the growing and promising field of sensor networks is a major challenge in order to facilitate the programmer task and bridge the gap between the applic...
Manuel Díaz, Bartolomé Rubio, Jos&ea...
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
14 years 5 months ago
Swarm Coordination for Pursuit Evasion Games using Sensor Networks
— In this work we consider the problem of pursuit evasion games (PEGs) where a group of pursuers is required to detect, chase and capture a group of evaders with the aid of a sen...
Luca Schenato, Songhwai Oh, Shankar Sastry, Prasan...
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
14 years 5 months ago
Performance of Multiple Description Coding in Sensor Networks with Finite Buffers
Sensor networks are usually dense networks where the network diversity can be exploited in order to overcome failures. In this paper, we study the use of multiple description tech...
Enrico Baccaglini, Guillermo Barrenetxea, Baltasar...
ICDE
2005
IEEE
130views Database» more  ICDE 2005»
14 years 5 months ago
Data Acquisition in Sensor Networks with Large Memories
Sensor Networks will soon become ubiquitous, making them essential tools for monitoring the activity and evolution of our surrounding environment. However such environments are ex...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki, Dimi...
ICDE
2005
IEEE
158views Database» more  ICDE 2005»
14 years 5 months ago
An Analysis of Spatio-Temporal Query Processing in Sensor Networks
Sensor networks are an emerging technology that provide new means to monitor and understand various phenomena. Nodes in a sensor network typically have a limited power supply, thu...
Alexandru Coman, Jörg Sander, Mario A. Nascim...
ICDCSW
2005
IEEE
14 years 5 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
ICDCSW
2005
IEEE
14 years 5 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICDCSW
2005
IEEE
14 years 5 months ago
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...
Syed A. Khayam, Hayder Radha
ICAS
2005
IEEE
95views Robotics» more  ICAS 2005»
14 years 5 months ago
Improving APS with Anchor Selection in Anisotropic Sensor Networks
Sensor networks are useful for environmental monitoring, military applications, disaster management, etc. In many applications, sensors are supposed to know their geographic locat...
King-Yip Cheng, Vincent Tam, King-Shan Lui