Sciweavers

1547 search results - page 64 / 310
» Channel-Specific Wireless Sensor Network Path Data
Sort
View
141
Voted
GLOBECOM
2009
IEEE
15 years 9 months ago
Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks
—The paper addresses the maximal lifetime problem in sensor-target surveillance networks. Given a set of sensors and targets in an Euclidean plane, each sensor can watch all targ...
Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Xiaohua Jia,...
145
Voted
SAINT
2008
IEEE
15 years 9 months ago
Managing Heterogeneous Data Flows in Wireless Sensor Networks Using a "Split Personality" Mote Platform
Remote sensing applications are increasingly making use of sensors that generate demanding data flows (e.g. digital imaging devices). This paper presents the
Danny Hughes, Mickaël Daudé, Geoff Cou...
121
Voted
MSN
2005
Springer
15 years 8 months ago
Using MDS Codes for the Key Establishment of Wireless Sensor Networks
Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small numbe...
Jing Deng, Yunghsiang S. Han
146
Voted
ICC
2007
IEEE
177views Communications» more  ICC 2007»
15 years 9 months ago
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
—Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energ...
Ming Liu, Yuan Zheng, Jiannong Cao, Guihai Chen, L...
127
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 2 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux