It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Hierarchical clustering is used widely to organize data and search for patterns. Previous algorithms assume that the body of data being clustered is fixed while the algorithm runs...
H. Van Dyke Parunak, Richard Rohwer, Theodore C. B...
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
Abstract—Many applications in wireless sensor networks require communication performance that is both consistent and high quality. Unfortunately, performance of current network p...
Shan Lin, Gang Zhou, Kamin Whitehouse, Yafeng Wu, ...
We focus on data gathering problems in energy-constrained wireless sensor networks. We study store-and-gather problems where data are locally stored on the sensors before the data ...