Sciweavers

43 search results - page 8 / 9
» Key Predistribution Schemes for Sensor Networks Using Finite...
Sort
View
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
14 years 6 days ago
A novel generative encoding for exploiting neural network sensor and output geometry
A significant problem for evolving artificial neural networks is that the physical arrangement of sensors and effectors is invisible to the evolutionary algorithm. For example,...
David B. D'Ambrosio, Kenneth O. Stanley
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 1 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
CCS
2009
ACM
14 years 25 days ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
SODA
2008
ACM
118views Algorithms» more  SODA 2008»
13 years 7 months ago
Geodesic Delaunay triangulation and witness complex in the plane
We introduce a new feature size for bounded domains in the plane endowed with an intrinsic metric. Given a point x in a domain X, the homotopy feature size of X at x measures half...
Jie Gao, Leonidas J. Guibas, Steve Oudot, Yue Wang
BROADNETS
2006
IEEE
14 years 3 days ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra