Sciweavers

WINET
2010
159views more  WINET 2010»
13 years 2 months ago
Approximation algorithm for minimal convergecast time problem in wireless sensor networks
In this paper we consider how to collect data from sensors deployed in the Euclidean plane in a timeefficient way. We assume that all sensors could adjust their transmission range...
Weiping Shang, Peng-Jun Wan, Xiaodong Hu
WINET
2010
121views more  WINET 2010»
13 years 2 months ago
Transmission algorithm for video streaming over cellular networks
2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...
Y. Falik, A. Averbuch, U. Yechiali
WINET
2010
147views more  WINET 2010»
13 years 2 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
WINET
2010
145views more  WINET 2010»
13 years 2 months ago
Location-centric storage and query in wireless sensor networks
Location-centric storage (LCS) is envisioned as a promising scheme for robust and user-friendly ondemand data storage in networking environments such as the roadway sensor networks...
Kai Xing, Xiuzhen Cheng, Jiang Li, Min Song
WINET
2010
144views more  WINET 2010»
13 years 2 months ago
Cross-layer quality-driven adaptation for scheduling heterogeneous multimedia over 3G satellite networks
Wireless networks are experiencing a paradigm shift from focusing on the traditional data transfer to accommodating the rapidly increasing multimedia traffic. Hence, their schedul...
Hongfei Du, Xiaozheng Huang, Jie Liang, Jiangchuan...
WINET
2010
179views more  WINET 2010»
13 years 2 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
WINET
2010
185views more  WINET 2010»
13 years 2 months ago
TDMA scheduling algorithms for wireless sensor networks
Abstract Algorithms for scheduling TDMA transmissions in multi-hop networks usually determine the smallest length conflict-free assignment of slots in which each link or node is a...
Sinem Coleri Ergen, Pravin Varaiya
WINET
2010
85views more  WINET 2010»
13 years 2 months ago
Exploiting multi-interface networks: Connectivity and Cheapest Paths
Adrian Kosowski, Alfredo Navarra, Maria Cristina P...
WINET
2010
199views more  WINET 2010»
13 years 2 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
WINET
2010
153views more  WINET 2010»
13 years 2 months ago
Data aggregation in sensor networks using learning automata
One way to reduce energy consumption in wireless sensor networks is to reduce the number of packets being transmitted in the network. As sensor networks are usually deployed with a...
Mehdi Esnaashari, Mohammad Reza Meybodi