Sciweavers

2282 search results - page 128 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
154
Voted
SIGMOD
2003
ACM
116views Database» more  SIGMOD 2003»
16 years 4 months ago
Multimedia streaming in large-scale sensor networks with mobile swarms
Abstract-- Sensor networking technologies have developed very rapidly in the last ten years. In many situations, high quality multimedia streams may be required for providing detai...
Mario Gerla, Kaixin Xu
141
Voted
EUC
2006
Springer
15 years 8 months ago
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and ...
Jens-Peter Kaps, Berk Sunar
165
Voted
WISEC
2009
ACM
15 years 11 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
150
Voted
ISCAS
2003
IEEE
156views Hardware» more  ISCAS 2003»
15 years 10 months ago
GNOMES: a testbed for low power heterogeneous wireless sensor networks
Continuing trends in sensor, semiconductor and communication systems technology (smaller, faster, cheaper) make feasible very dense networks of fixed and mobile wireless devices ...
Erik Welsh, Walt Fish, J. Patrick Frantz