Sciweavers

2282 search results - page 255 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
LCN
2007
IEEE
15 years 11 months ago
Emergency Evacuation using Wireless Sensor Networks
—This paper presents a distributed algorithm to direct evacuees to exits through arbitrarily complex building layouts in emergency situations. The algorithm finds the safest pat...
Matthew Barnes, Hugh Leather, D. K. Arvind
143
Voted
SENSYS
2003
ACM
15 years 10 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal
IWCMC
2006
ACM
15 years 11 months ago
The hybrid mobile wireless sensor networks for data gathering
Introducing heterogeneous mobile devices, such as mobile phones into the large scale sparse wireless sensor networks is a promising research direction. These devices acting as mob...
Biao Ren, Jian Ma, Canfeng Chen
WCNC
2010
IEEE
15 years 9 months ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
166
Voted
SSDBM
2008
IEEE
146views Database» more  SSDBM 2008»
15 years 11 months ago
Kriging for Localized Spatial Interpolation in Sensor Networks
Abstract. The presence of coverage holes can adversely affect the accurate representation of natural phenomena being monitored by a Wireless Sensor Network (WSN). Current WSN resea...
Muhammad Umer, Lars Kulik, Egemen Tanin