129
click to vote
EWSN
16 years 22 days ago
2008 Springer
Abstract. By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibili...
109
click to vote
EWSN
16 years 22 days ago
2008 Springer
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
128
click to vote
EWSN
16 years 22 days ago
2008 Springer
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
143
click to vote
EWSN
16 years 22 days ago
2008 Springer
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
109
click to vote
EWSN
16 years 22 days ago
2008 Springer
We consider the problem of determining the transmission power assignment that maximizes the lifetime of a data-gathering wireless sensor network with stationary nodes and static tr...
|