Sciweavers

185 search results - page 37 / 37
» Energy Analysis of Public-Key Cryptography for Wireless Sens...
Sort
View
AAAI
2007
13 years 7 months ago
Nonmyopic Informative Path Planning in Spatio-Temporal Models
In many sensing applications we must continuously gather information to provide a good estimate of the state of the environment at every point in time. A robot may tour an environ...
Alexandra Meliou, Andreas Krause, Carlos Guestrin,...
IEEESP
2006
130views more  IEEESP 2006»
13 years 4 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
MOBISYS
2005
ACM
14 years 4 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
ICCCN
2008
IEEE
13 years 11 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
DATE
2007
IEEE
111views Hardware» more  DATE 2007»
13 years 11 months ago
Cost-aware capacity optimization in dynamic multi-hop WSNs
Low energy consumption and load balancing are required for enhancing lifetime at Wireless Sensor Networks (WSN). In addition, network dynamics and different delay, throughput, and...
Jukka Suhonen, Mikko Kohvakka, Mauri Kuorilehto, M...