Sciweavers

2189 search results - page 377 / 438
» Detecting Phantom Nodes in Wireless Sensor Networks
Sort
View
MDM
2009
Springer
150views Communications» more  MDM 2009»
15 years 6 months ago
Perimeter-Based Data Replication in Mobile Sensor Networks
—This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm. Our objectives are to explore a given geographic region by detecting spatio-temporal ev...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, M...
INFOCOM
2010
IEEE
14 years 10 months ago
Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor Networks
In this paper, we investigate the multi-channel MAC problem in underwater acoustic sensor networks. To reduce hardware cost, only one acoustic transceiver is often preferred on ev...
Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zaihan Jiang
ICC
2008
IEEE
160views Communications» more  ICC 2008»
15 years 6 months ago
Localization via TDOA in a UWB Sensor Network using Neural Networks
In an Ultra-wide band (UWB) sensor network signal reflections from objects can be used to accurately determine the location. UWB signals are preferred in these types of sensor ne...
Salih Ergüt, Ramesh R. Rao, Özgür D...
AAIM
2009
Springer
98views Algorithms» more  AAIM 2009»
15 years 6 months ago
Latency Constrained Aggregation in Chain Networks Admits a PTAS
This paper studies the aggregation of messages in networks that consist of a chain of nodes, and each message is time-constrained such that it needs to be aggregated during a give...
Tim Nonner, Alexander Souza
SECON
2008
IEEE
15 years 6 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang