Sciweavers

2282 search results - page 413 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
EIT
2008
IEEE
15 years 10 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
VTC
2010
IEEE
162views Communications» more  VTC 2010»
15 years 2 months ago
Performance Evaluation of Joint Network-Channel Coding under a Real Network Topology Model
— Adaptive network coded cooperation (ANCC) has been proposed as an effective scheme to combine network and channel coding for cooperative wireless networks by matching network-o...
Kun Pang, Zihuai Lin, Yonghui Li, Branka Vucetic
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
15 years 9 months ago
Power-aware data analysis in sensor networks
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 9 months ago
Towards Feasible Topology Formation Algorithms for Bluetooth-based WPANs
In this paper, we tackle the problem of topology formation in Bluetooth Wireless Personal Area Networks (BTWPANs). We first overview and extend a previously proposed centralized ...
Carla-Fabiana Chiasserini, Marco Ajmone Marsan, El...
IPSN
2009
Springer
15 years 10 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...