Sciweavers

SENSYS
2006
ACM
14 years 5 months ago
Is data-centric storage and querying scalable?
Joon Ahn, Bhaskar Krishnamachari
SENSYS
2006
ACM
14 years 5 months ago
Using grid technologies to optimise a wireless sensor network for flood management
Danny Hughes, Phil Greenwood, Barry Porter, Paul G...
SENSYS
2006
ACM
14 years 5 months ago
A funneling-MAC for high performance data collection in sensor networks
Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbe...
SENSYS
2006
ACM
14 years 5 months ago
Scalable data aggregation for dynamic events in sensor networks
Computing and maintaining network structures for efficient data aggregation incurs high overhead for dynamic events where the set of nodes sensing an event changes with time. Mor...
Kai-Wei Fan, Sha Liu, Prasun Sinha
SENSYS
2006
ACM
14 years 5 months ago
Routing and processing multiple aggregate queries in sensor networks
Niki Trigoni, Alexandre Guitton, Antonios Skordyli...
SASN
2006
ACM
14 years 5 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
SASN
2006
ACM
14 years 5 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
SASN
2006
ACM
14 years 5 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...