119
Voted
EWSN
16 years 2 days ago
2008 Springer
Abstract. By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibili...
105
click to vote
EWSN
16 years 2 days ago
2008 Springer
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
120
click to vote
EWSN
16 years 2 days ago
2008 Springer
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
134
Voted
EWSN
16 years 2 days ago
2008 Springer
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
103
Voted
EWSN
16 years 2 days ago
2008 Springer
We consider the problem of determining the transmission power assignment that maximizes the lifetime of a data-gathering wireless sensor network with stationary nodes and static tr...
|