Sciweavers

1772 search results - page 287 / 355
» Lifetime Modeling of a Sensor Network
Sort
View
165
Voted
SUTC
2006
IEEE
15 years 10 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
MOBIHOC
2002
ACM
16 years 3 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter
ICC
2008
IEEE
102views Communications» more  ICC 2008»
15 years 10 months ago
Reliable Routing for Roadside to Vehicle Communications in Rural Areas
—The demands for vehicular Internet access are proliferating. Access Points (APs) can be deployed along the roadside to provide wireless coverage and network access for mobile ve...
Shen Wan, Jian Tang, Richard S. Wolff
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 5 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
MOBISYS
2010
ACM
15 years 6 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...