Sciweavers

523 search results - page 39 / 105
» A simulation model for military deployment
Sort
View
TMC
2012
13 years 2 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
MOBICOM
2004
ACM
15 years 6 months ago
On k-coverage in a mostly sleeping sensor network
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors to sleep for most of their ...
Santosh Kumar, Ten-Hwang Lai, József Balogh
178
Voted
TON
2012
13 years 3 months ago
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important perfo...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang...
WOSP
2000
ACM
15 years 4 months ago
Analytic model of Web servers in distributed environments
In this paper, we illustrate a model-based approach to Web server performance evaluation, and present an analytic queueing model of Web servers in distributed environments. Perfor...
Paul Reeser, Rema Hariharan
82
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
—Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype sys...
Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun...