Sciweavers

2282 search results - page 413 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
EIT
2008
IEEE
15 years 8 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
VTC
2010
IEEE
162views Communications» more  VTC 2010»
15 years 9 days ago
Performance Evaluation of Joint Network-Channel Coding under a Real Network Topology Model
— Adaptive network coded cooperation (ANCC) has been proposed as an effective scheme to combine network and channel coding for cooperative wireless networks by matching network-o...
Kun Pang, Zihuai Lin, Yonghui Li, Branka Vucetic
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
15 years 7 months ago
Power-aware data analysis in sensor networks
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 7 months ago
Towards Feasible Topology Formation Algorithms for Bluetooth-based WPANs
In this paper, we tackle the problem of topology formation in Bluetooth Wireless Personal Area Networks (BTWPANs). We first overview and extend a previously proposed centralized ...
Carla-Fabiana Chiasserini, Marco Ajmone Marsan, El...
IPSN
2009
Springer
15 years 8 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...