Sciweavers

623 search results - page 117 / 125
» Constrained opportunistic power control in wireless networks
Sort
View
JUCS
2006
86views more  JUCS 2006»
15 years 1 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
NETCOOP
2007
Springer
15 years 8 months ago
Minimum Transmission Energy Trajectories for a Linear Pursuit Problem
In this paper we study a pursuit problem in the context of a wireless sensor network, where the pursuer (i.e., mobile sink) trying to capture a pursuee (i.e., tracked object), movi...
Attila Vidács, Jorma T. Virtamo
108
Voted
IJSNET
2008
114views more  IJSNET 2008»
15 years 1 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
139
Voted
ANSS
2004
IEEE
15 years 5 months ago
SENS: A Sensor, Environment and Network Simulator
Recent advances in micro electro-mechanical systems and VLSI lithography have enabled the miniaturization of sensors and controllers. Such minitiarization facilitates the deployme...
Sameer Sundresh, WooYoung Kim, Gul Agha
120
Voted
WS
2004
ACM
15 years 7 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner