Sciweavers

2032 search results - page 92 / 407
» Application Development in Vision-Enabled Wireless Sensor Ne...
Sort
View
TMC
2010
138views more  TMC 2010»
15 years 1 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
243
Voted
ADHOC
2011
14 years 10 months ago
MC-LMAC: A multi-channel MAC protocol for wireless sensor networks
Abstract—In traditional wireless sensor network (WSN) applications, energy efficiency is considered to be the most important concern whereas utilizing the use of bandwidth and m...
Özlem Durmaz Incel, Lodewijk van Hoesel, Pier...
130
Voted
DMSN
2010
ACM
15 years 4 months ago
PAO: power-efficient attribution of outliers in wireless sensor networks
Sensor nodes constitute inexpensive, disposable devices that are often scattered in harsh environments of interest so as to collect and communicate desired measurements of monitor...
Nikos Giatrakos, Yannis Kotidis, Antonios Deligian...
129
Voted
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 8 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ICDS
2010
IEEE
15 years 10 months ago
Body Sensor Networks for Mobile Health Monitoring: Experience in Europe and Australia
—Remote ambulatory monitoring is widely seen as playing a key part in addressing the impending crisis in health care provision. We describe two mobile health solutions, one devel...
Val Jones, Valérie Gay, Peter Leijdekkers