Previously proposed sensor network data dissemination schemes require periodic low-rate flooding of data in order to allow recovery from failure. We consider constructing two kind...
Deepak Ganesan, Ramesh Govindan, Scott Shenker, De...
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
— We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy effici...
Ren Ping Liu, Zvi Rosberg, Iain B. Collings, Carol...
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Science is increasingly driven by data collected automatically from arrays of inexpensive sensors. The collected data volumes require a different approach from the scientists'...
Stuart Ozer, Jim Gray, Alexander S. Szalay, Andrea...