Sciweavers

706 search results - page 67 / 142
» Deploying Four-Connectivity and Full-Coverage Wireless Senso...
Sort
View
APCHI
2008
IEEE
15 years 4 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
PERVASIVE
2008
Springer
14 years 9 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
IPSN
2007
Springer
15 years 3 months ago
Acoustic source localization using the acoustic ENSBox
Field biologists use animal sounds to discover the presence of individuals and to study their behavior. The recent development of new deployable acoustic sensor platforms presents...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
ICON
2007
IEEE
15 years 4 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
COMCOM
2007
103views more  COMCOM 2007»
14 years 9 months ago
Using event detection latency to evaluate the coverage of a wireless sensor network
A wireless sensor network (WSN) consists of many tiny and low-power devices deployed in a sensing field. One of the major tasks of a WSN is to monitor the surrounding environment...
You-Chiun Wang, Kai-Yang Cheng, Yu-Chee Tseng