Sciweavers

6164 search results - page 260 / 1233
» Environmental Sensor Networks
Sort
View
IJSN
2006
76views more  IJSN 2006»
15 years 4 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
JUCS
2006
140views more  JUCS 2006»
15 years 4 months ago
A Modular Architecture for Nodes in Wireless Sensor Networks
: The growth of sensor networks during the last years is a fact and within this field, wireless sensor networks are growing particularly as there are many applications that demand ...
Jorge Portilla, Angel de Castro, Eduardo de la Tor...
PERCOM
2010
ACM
15 years 2 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
SENSYS
2010
ACM
15 years 2 months ago
Practical 3D geographic routing for wireless sensor networks
Geographic routing is of interest for sensor networks because a point-to-point primitive is an important building block for data-centric applications. While there is a significant...
Jiangwei Zhou, Yu Chen, Ben Leong, Pratibha Sundar...
TMC
2010
155views more  TMC 2010»
15 years 2 months ago
Maximizing the Lifetime of a Barrier of Wireless Sensors
—To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so tha...
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...