Sciweavers

42 search results - page 3 / 9
» Distributed, Reliable Restoration Techniques using Wireless ...
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
CCS
2008
ACM
13 years 7 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ATAL
2005
Springer
13 years 11 months ago
Intelligent agents for wireless sensor networks
Interpolation is a technique used to estimate the value of a function at a given location, assuming that the values of the function are known for surrounding locations. A Wireless...
Richard Tynan, David Marsh, Donal O'Kane, Gregory ...
SENSYS
2004
ACM
13 years 10 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
SENSYS
2004
ACM
13 years 10 months ago
Medians and beyond: new aggregation techniques for sensor networks
Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensors, however, have significant power constraint (battery life), makin...
Nisheeth Shrivastava, Chiranjeeb Buragohain, Divya...