Sciweavers

17164 search results - page 276 / 3433
» Applications of Sensor Networks
Sort
View
145
Voted
CISSE
2008
Springer
15 years 6 months ago
A New Methodology for Self Localization in Wireless Sensor Networks
Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the locat...
Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia R...
WIOPT
2005
IEEE
15 years 10 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
NETWORKING
2007
15 years 6 months ago
Localization for Large-Scale Underwater Sensor Networks
Abstract. In this paper, we study the localization problem in large-scale underwater sensor networks. The adverse aqueous environments, the node mobility, and the large network sca...
Zhong Zhou, Jun-Hong Cui, Shengli Zhou
143
Voted
TMM
2011
121views more  TMM 2011»
14 years 11 months ago
Spread Spectrum Visual Sensor Network Resource Management Using an End-to-End Cross-Layer Design
—In this paper, we propose an approach to manage network resources for a direct sequence code division multiple access (DS-CDMA) visual sensor network where nodes monitor scenes ...
Elizabeth S. Bentley, Lisimachos P. Kondi, John D....
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna