Sciweavers

1866 search results - page 244 / 374
» Ecoinformatics using wireless sensor networks: An overview
Sort
View
MOBIHOC
2007
ACM
15 years 9 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
WCNC
2008
IEEE
15 years 4 months ago
Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks
Abstract— This paper explores integrated source-channel decoding, driven by wireless sensor network applications where correlated information acquired by the network is gathered ...
Sheryl L. Howard, Paul G. Flikkema
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
15 years 4 months ago
HybridExploration: A distributed approach to terrain exploration using mobile and fixed sensor nodes
— When an emergency occurs within a building, it may be initially safer to send autonomous mobile nodes, instead of human responders, to explore the area and identify hazards and...
Ettore Ferranti, Niki Trigoni, Mark Levene
IPSN
2009
Springer
15 years 4 months ago
Anti-jamming for embedded wireless networks
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and ...
Miroslav Pajic, Rahul Mangharam
IPSN
2007
Springer
15 years 4 months ago
A platform for ubiquitous sensor deployment in occupational and domestic environments
In this paper, we introduce the “Plug” sensor network, a ubiquitous networked sensing platform ideally suited to broad deployment in environments where people work and live. T...
Joshua Lifton, Mark Feldmeier, Yasuhiro Ono, Camer...