Sciweavers

2282 search results - page 163 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
GLOBECOM
2010
IEEE
15 years 2 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
ITIIS
2008
128views more  ITIIS 2008»
15 years 4 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
152
Voted
ISCA
2005
IEEE
172views Hardware» more  ISCA 2005»
15 years 10 months ago
An Ultra Low Power System Architecture for Sensor Network Applications
Recent years have seen a burgeoning interest in embedded wireless sensor networks with applications ranging from habitat monitoring to medical applications. Wireless sensor networ...
Mark Hempstead, Nikhil Tripathi, Patrick Mauro, Gu...
ICUMT
2009
15 years 2 months ago
Effective buffer and storage management in DTN nodes
Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, ...
Stylianos Dimitriou, Vassilis Tsaoussidis
DCOSS
2009
Springer
15 years 11 months ago
LazySync: A New Synchronization Scheme for Distributed Simulation of Sensor Networks
To meet the demands for high simulation fidelity and speed, parallel and distributed simulation techniques are widely used in building wireless sensor network simulators. However,...
Zhong-Yi Jin, Rajesh Gupta