Sciweavers

808 search results - page 94 / 162
» Attack-Resistant Location Estimation in Wireless Sensor Netw...
Sort
View
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 4 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
REALWSN
2010
14 years 4 months ago
K2: A System for Campaign Deployments of Wireless Sensor Networks
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...
TASE
2008
IEEE
14 years 9 months ago
Sensor Selection in Arbitrary Dimensions
We address the sensor selection problem which arises in tracking and localization applications. In sensor selection, the goal is to select a small number of sensors whose measureme...
Volkan Isler, Malik Magdon-Ismail
EMS
2009
IEEE
15 years 4 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
FLAIRS
2006
14 years 11 months ago
A Cognitive Approach for Gateway Relocation in Wireless Sensor Networks
Wireless sensor networks are composed of a number of sensors probing their surroundings and disseminating the collected data to a gateway node for processing. Numerous military an...
Waleed A. Youssef, Mohamed F. Younis