Sciweavers

75 search results - page 14 / 15
» Optimal Jamming Attacks and Network Defense Policies in Wire...
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 5 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
JSAC
2007
180views more  JSAC 2007»
13 years 5 months ago
Cooperative Distributed MIMO Channels in Wireless Sensor Networks
— The large number of network nodes and the energy constraints make Wireless Sensor Networks (WSN) one of the most important application fields for Cooperative Diversity. Node c...
Aitor del Coso, Umberto Spagnolini, Christian Ibar...
MOBIHOC
2005
ACM
14 years 4 months ago
Low-coordination topologies for redundancy in sensor networks
Tiny, low-cost sensor devices are expected to be failure-prone and hence in many realistic deployment scenarios for sensor networks these nodes are deployed in higher than necessa...
Rajagopal Iyengar, Koushik Kar, Suman Banerjee
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
14 years 6 months ago
Approximate Data Collection in Sensor Networks using Probabilistic Models
Wireless sensor networks are proving to be useful in a variety of settings. A core challenge in these networks is to minimize energy consumption. Prior database research has propo...
David Chu, Amol Deshpande, Joseph M. Hellerstein, ...
NETCOOP
2007
Springer
13 years 11 months ago
Minimum Transmission Energy Trajectories for a Linear Pursuit Problem
In this paper we study a pursuit problem in the context of a wireless sensor network, where the pursuer (i.e., mobile sink) trying to capture a pursuee (i.e., tracked object), movi...
Attila Vidács, Jorma T. Virtamo