Sciweavers

710 search results - page 47 / 142
» Composite Event Detection in Wireless Sensor Networks
Sort
View
GLOBECOM
2006
IEEE
15 years 5 months ago
Blocking Vulnerable Paths of Wireless Sensor Networks
— In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as m...
Shu Zhou, Min-You Wu, Wei Shu
IFIP
2007
Springer
15 years 5 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
COMPSAC
2008
IEEE
15 years 5 months ago
A Component-Based Model and Language for Wireless Sensor Network Applications
Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 9 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
DMSN
2009
ACM
15 years 5 months ago
Extracting tennis statistics from wireless sensing environments
Creating statistics from sporting events is now widespread with most efforts to automate this process using various sensor devices. The problem with many of these statistical app...
Adel Shaeib, Kenneth Conroy, Mark Roantree