gence of Networking Abstractions and Techniques in TinyOS Philip Levis , Sam Madden , David Gay , Joseph Polastre , Robert Szewczyk , Alec Woo , Eric Brewer and David Culler EECS ...
Philip Levis, Samuel Madden, David Gay, Joseph Pol...
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
The development of high-level programming environments is essential if wireless sensor networks are to be accessible to nonexperts. In this paper, we present the Regiment system, ...
Sensor networks introduce new resource allocation problems in which sensors need to be assigned to the tasks they best help. Such problems have been previously studied in simplifi...
Hosam Rowaihy, Matthew P. Johnson, Diego Pizzocaro...
Sensor networks are being used for implementation of a large number of applications involving distributed and collaborative computation. Extensive research has focused upon design ...