Sciweavers

3624 search results - page 652 / 725
» Lifetime in Wireless Sensor Networks
Sort
View
104
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
Relay Selection for Low-Complexity Coded Cooperation
— This paper explores relay selection and selection diversity for coded cooperation in wireless sensor networks, with complexity constraints for the sensor nodes. In previous wor...
Josephine P. K. Chu, Raviraj S. Adve, Andrew W. Ec...
PERCOM
2007
ACM
16 years 6 days ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
UIST
2004
ACM
15 years 6 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
122
Voted
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 7 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
145
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 7 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang