Sciweavers

299 search results - page 29 / 60
» Deploying a Sensor Network in an Extreme Environment
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks
Abstract—Many sensor network applications are tightly coupled with the geometric environment where the sensor nodes are deployed. The topological skeleton extraction has shown gr...
Hongbo Jiang, Wenping Liu, Dan Wang, Chen Tian, Xi...
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
15 years 3 months ago
Swarm Coordination for Pursuit Evasion Games using Sensor Networks
— In this work we consider the problem of pursuit evasion games (PEGs) where a group of pursuers is required to detect, chase and capture a group of evaders with the aid of a sen...
Luca Schenato, Songhwai Oh, Shankar Sastry, Prasan...
ADHOCNETS
2009
Springer
15 years 4 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
PERCOM
2005
ACM
15 years 3 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi
DMSN
2005
ACM
14 years 11 months ago
The threshold join algorithm for top-k queries in distributed sensor networks
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Demetrios Zeinalipour-Yazti, Zografoula Vagena, Di...