Sciweavers

2282 search results - page 396 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ESAS
2007
Springer
15 years 10 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ICC
2008
IEEE
137views Communications» more  ICC 2008»
15 years 10 months ago
On the Effect of Localization Errors on Geographic Routing in Sensor Networks
—Recently, network localization systems that are based on inter-node ranges have received significant attention. Geographic routing has been considered an application which can u...
Bo Peng, Rainer Mautz, Andrew H. Kemp, Washington ...
141
Voted
DCOSS
2008
Springer
15 years 5 months ago
Energy-Efficient Task Mapping for Data-Driven Sensor Network Macroprogramming
Data-driven macroprogramming of wireless sensor networks (WSNs) provides an easy to use high-level task graph representation to the application developer. However, determining an e...
Animesh Pathak, Viktor K. Prasanna
IEEECIT
2006
IEEE
15 years 10 months ago
Adaptive Routing for Sensor Networks using Reinforcement Learning
Efficient and robust routing is central to wireless sensor networks (WSN) that feature energy-constrained nodes, unreliable links, and frequent topology change. While most existi...
Ping Wang, Ting Wang
100
Voted
ICDCSW
2006
IEEE
15 years 10 months ago
Fair Dice: A Tilt and Motion-Aware Cube with a Conscience
As an example of digital augmentation of a tiny object, a small cube-sized die is presented that perceives and records what face it rolls on. It is thus able to detect bias and co...
Kristof Van Laerhoven, Hans-Werner Gellersen