Sciweavers

2282 search results - page 175 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
135
Voted
IJSNET
2006
107views more  IJSNET 2006»
15 years 5 months ago
In-network aggregation trade-offs for data collection in wireless sensor networks
This paper explores in-network aggregation as a power-efficient mechanism for collecting data in wireless sensor networks. In particular, we focus on sensor network scenarios wher...
Ignacio Solis, Katia Obraczka
WINET
2011
14 years 12 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
MSWIM
2005
ACM
15 years 10 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
WOWMOM
2006
ACM
149views Multimedia» more  WOWMOM 2006»
15 years 11 months ago
On-Demand Reliable Medium Access in Sensor Networks
A wireless sensor network typically consists of a dense deployment of sensor nodes to achieve higher resolution and better network coverage. A dense network also increases the fau...
Ratnabali Biswas, Vivek Jain, Chittabrata Ghosh, D...
167
Voted
IPSN
2005
Springer
15 years 10 months ago
Tracking on a graph
Abstract— This paper considers the problem of tracking objects with sparsely located binary sensors. Tracking with a sensor network is a challenging task due to the inaccuracy of...
Songhwai Oh, Shankar Sastry