Sciweavers

2282 search results - page 155 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
15 years 10 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...
ICRA
2009
IEEE
174views Robotics» more  ICRA 2009»
15 years 11 months ago
Range-only SLAM with a mobile robot and a Wireless Sensor Networks
— This paper presents the localization of a mobile robot while simultaneously mapping the position of the nodes of a Wireless Sensor Network using only range measurements. The ro...
Emanuele Menegatti, Andrea Zanella, Stefano Zilli,...
INFOCOM
2011
IEEE
14 years 8 months ago
Multiple task scheduling for low-duty-cycled wireless sensor networks
—For energy conservation, a wireless sensor network is usually designed to work in a low-duty-cycle mode, in which a sensor node keeps active for a small percentage of time durin...
Shuguang Xiong, Jianzhong Li, Mo Li, Jiliang Wang,...
125
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks
—We present the Flash flooding protocol for rapid network flooding in wireless sensor networks. Traditional flooding protocols can be very slow because of neighborhood content...
Jiakang Lu, Kamin Whitehouse
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 9 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...