Sciweavers

639 search results - page 113 / 128
» Contour detection using actuated sensor networks
Sort
View
IPSN
2007
Springer
15 years 4 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
TMC
2011
119views more  TMC 2011»
14 years 4 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 4 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
SOCC
2008
IEEE
117views Education» more  SOCC 2008»
15 years 4 months ago
In-situ self-aware adaptive power control system with multi-mode power gating network
An in-situ self-aware adaptive power control (APC) system is presented in this paper. This APC system consists of a voltage sensor, a variable threshold comparator, slack detectio...
Wei-Chih Hsieh, Wei Hwang
TMC
2012
13 years 7 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...