Sciweavers

2282 search results - page 418 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ADHOCNOW
2006
Springer
15 years 8 months ago
File System Support for Adjustable Resolution Applications in Sensor Networks
Flash memory is often the technology of choice for sensor networks because of its cost-effectiveness and attractive energy properties. In storage-constrained sensor network applica...
Vikram P. Munishwar, Sameer Tilak, Nael B. Abu-Gha...
ESAS
2004
Springer
15 years 7 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
EWSN
2008
Springer
16 years 1 months ago
Radio Characterization of 802.15.4 and Its Impact on the Design of Mobile Sensor Networks
Future mobile sensing systems are being designed using 802.15.4 low-power short-range radios for a diverse set of devices from embedded mobile motes to sensor-enabled cellphones in...
Emiliano Miluzzo, Xiao Zheng, Kristof Fodor, Andre...
ICWN
2008
15 years 3 months ago
Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Landslides are one of the environmental disasters that cause massive destruction of human life and infrastructure. Real time monitoring of a landslide prone areas are necessary to...
Ramesh Maneesha, P. Ushakumari
113
Voted
MOBICOM
2006
ACM
15 years 8 months ago
Coverage and connectivity in three-dimensional networks
Although most wireless terrestrial networks are based on twodimensional (2D) design, in reality, such networks operate in threedimensions (3D). Since most often the size (i.e., th...
S. M. Nazrul Alam, Zygmunt J. Haas