Sciweavers

2282 search results - page 309 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
15 years 11 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun
141
Voted
TMC
2008
156views more  TMC 2008»
15 years 4 months ago
Rendezvous Planning in Wireless Sensor Networks with Mobile Elements
Recent research shows that significant energy saving can be achieved in wireless sensor networks by using mobile elements (MEs) capable of carrying data mechanically. However, the ...
Guoliang Xing, Tian Wang, Zhihui Xie, Weijia Jia
173
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao
ATAL
2008
Springer
15 years 6 months ago
A mobile agent approach to opportunistic harvesting in wireless sensor networks
This demonstration illustrates the feasibility of harvesting data from a WSN by interested parties, either in the WSN coverage area or in a remote location. Embedded and mobile ag...
Richard Tynan, Conor Muldoon, Michael J. O'Grady, ...
IJSNET
2006
217views more  IJSNET 2006»
15 years 4 months ago
Optimal sleep scheduling with transmission range assignment in application-specific wireless sensor networks
: To extend the functional lifetime of battery-operated Wireless Sensor Networks (WSNs), stringent sleep scheduling strategies with communication duty cycles running at sub-1% rang...
Rick W. Ha, Pin-Han Ho, Xuemin Shen