Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
The most advanced logistics solutions that are currently adopted in ports and terminals use RFID- and GPS-based technologies to identify and localize shipping containers in the ya...
Stefano Abbate, Marco Avvenuti, Paolo Corsini, Ale...
A distributed adaptive algorithm to estimate a time-varying signal, measured by a wireless sensor network, is designed and analyzed. The presence of measurement noises and of packe...
Carlo Fischione, Alberto Speranzon, Karl Henrik Jo...