Sciweavers

2282 search results - page 415 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICDCS
2008
IEEE
15 years 8 months ago
Distributed Connected Dominating Set Construction in Geometric k-Disk Graphs
In this paper, we study the problem of minimum connected dominating set in geometric k-disk graphs. This research is motivated by the problem of virtual backbone construction in w...
Kai Xing, Wei Cheng, E. K. Park, Shmuel Rotenstrei...
ARCS
2007
Springer
15 years 8 months ago
Architecture for Collaborative Business Items
Sensor network technology is pushing towards integration into the business world. By using sensor node hardware to augment real life business items it is possible to capture the wo...
Till Riedel, Christian Decker, Phillip Scholl, Alb...
WH
2010
185views Healthcare» more  WH 2010»
14 years 8 months ago
Blood oxygen estimation from compressively sensed photoplethysmograph
In this work, we consider low power, wearable pulse oximeter sensors for ambulatory, remote vital signs monitoring applications. It is extremely important for such sensors to main...
Pawan K. Baheti, Harinath Garudadri, Somdeb Majumd...
129
Voted
PERCOM
2005
ACM
16 years 1 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
JSAC
2010
147views more  JSAC 2010»
15 years 11 days ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...