Sciweavers

1977 search results - page 144 / 396
» Distributed Source Coding in Wireless Sensor Networks
Sort
View
131
Voted
MOBIHOC
2008
ACM
16 years 2 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
196
Voted
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 2 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
145
Voted
ADHOC
2006
184views more  ADHOC 2006»
15 years 2 months ago
Wireless underground sensor networks: Research challenges
This work introduces the concept of a Wireless Underground Sensor Network (WUSN). WUSNs can be used to monitor a variety of conditions, such as soil properties for agricultural ap...
Ian F. Akyildiz, Erich P. Stuntebeck
127
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 2 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
157
Voted
WSTFEUS
2003
IEEE
15 years 8 months ago
DOLPHIN: An Autonomous Indoor Positioning System in Ubiquitous Computing Environment
Determining physical location of indoor objects is one of the key issues in development of context-aware applications in ubiquitous computing environment. This is mainly because c...
Yasuhiro Fukuju, Masateru Minami, Hiroyuki Morikaw...