Sciweavers

1692 search results - page 254 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
WETICE
2003
IEEE
15 years 5 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis
SENSYS
2006
ACM
15 years 5 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
DMSN
2007
ACM
15 years 3 months ago
Similarity-aware query allocation in sensor networks with multiple base stations
In this paper, we consider a large scale sensor network comprising multiple, say K, base stations and a large number of wireless sensors. Such an infrastructure is expected to be ...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan, Yongluan...
ATAL
2010
Springer
15 years 29 days ago
A decentralised coordination algorithm for minimising conflict and maximising coverage in sensor networks
In large wireless sensor networks, the problem of assigning radio frequencies to sensing agents such that no two connected sensors are assigned the same value (and will thus inter...
Ruben Stranders, Alex Rogers, Nicholas R. Jennings
PIMRC
2008
IEEE
15 years 6 months ago
Cooperative handoff in wireless networks
—In 802.11-based wireless networks the stations (STAs) are associated with the available access points (APs) and communicate through them. In traditional handoff schemes the STAs...
George Athanasiou, Thanasis Korakis, Leandros Tass...