Sciweavers

SUTC
2006
IEEE
15 years 2 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
SUTC
2006
IEEE
15 years 2 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
SUTC
2006
IEEE
15 years 2 months ago
A Novel Realistic Simulation Tool for Video Transmission over Wireless Network
Chih-Heng Ke, Cheng-Han Lin, Ce-Kuen Shieh, Wen-Sh...
SUTC
2006
IEEE
15 years 2 months ago
Energy Efficient Sleep Schedule for Achieving Minimum Latency in Query based Sensor Networks
Energy management in sensor networks is crucial to prolong the network lifetime. Though existing sleep scheduling algorithms save energy, they lead to a large increase in end-to-e...
N. A. Vasanthi, S. Annadurai
SUTC
2006
IEEE
15 years 2 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
Sensor Networks
Top of PageReset Settings