Sciweavers

273 search results - page 54 / 55
» Towards lightweight self-configuration in wireless sensor ne...
Sort
View
DCOSS
2009
Springer
13 years 10 months ago
Local Construction of Spanners in the 3-D Space
Abstract. In this paper we present local distributed algorithms for constructing spanners in wireless sensor networks modeled as unit ball graphs (shortly UBGs) and quasi-unit ball...
Iyad A. Kanj, Ge Xia, Fenghui Zhang
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
PERCOM
2005
ACM
14 years 5 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
JPDC
2007
112views more  JPDC 2007»
13 years 5 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
NCA
2008
IEEE
14 years 5 days ago
APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems
This paper proposes APART (A Posteriori Active ReplicaTion), a novel active replication protocol specifically tailored for multi-tier data acquisition systems. Unlike existing ac...
Paolo Romano, Diego Rughetti, Francesco Quaglia, B...