Sciweavers

2282 search results - page 431 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICDE
2010
IEEE
288views Database» more  ICDE 2010»
16 years 1 months ago
Global Iceberg Detection over Distributed Data Streams
In today's Internet applications or sensor networks we often encounter large amounts of data spread over many physically distributed nodes. The sheer volume of the data and ba...
Ashwin Lall, Haiquan (Chuck) Zhao, Jun Xu, Mitsuno...
117
Voted
AINA
2010
IEEE
15 years 7 months ago
Routing Loops in DAG-Based Low Power and Lossy Networks
Abstract—Directed Acyclic Graphs (DAGs), rooted at popular/default destinations, have emerged as a preferred mechanism to provide IPv6 routing functionality in large scale low po...
Weigao Xie, Mukul Goyal, Hossein Hosseini, Jerald ...
INFOCOM
2007
IEEE
15 years 8 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
96
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
On Maximizing Lifetime of a Sensor Cluster
We consider the energy consumed in radio transmission of a set of sensors forming a data gathering wireless network. Our objective is to enhance the lifetime of such networks by e...
Samar Agnihotri, Pavan Nuggehalli, H. S. Jamadagni