Sciweavers

2282 search results - page 377 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
GLOBECOM
2008
IEEE
15 years 10 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
PERCOM
2005
ACM
16 years 3 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
ISAAC
2005
Springer
117views Algorithms» more  ISAAC 2005»
15 years 9 months ago
Basic Computations in Wireless Networks
Abstract. In this paper we address the problem of estimating the number of stations in a wireless network. Under the assumption that each station can detect collisions, we show tha...
Ioannis Caragiannis, Clemente Galdi, Christos Kakl...
WACV
2008
IEEE
15 years 10 months ago
Distributed Visual Processing for a Home Visual Sensor Network
deliver objects, handle emergency, wherever he/she is inside the home. In addition, the burden of processing We address issues dealing with distributed visual power can be distribu...
Kwangsu Kim, Gérard G. Medioni
DCOSS
2006
Springer
15 years 7 months ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama