Sciweavers

2268 search results - page 163 / 454
» Modeling wireless shadow networks
Sort
View
ICRA
2008
IEEE
146views Robotics» more  ICRA 2008»
15 years 11 months ago
Exploration of an incremental suite of microscopic models for acoustic event monitoring using a robotic sensor network
— Simulation is frequently used in the study of multi-agent systems. Unfortunately, in many cases, it is not necessarily clear how faithfully the details of the simulated model r...
Christopher M. Cianci, Jim Pugh, Alcherio Martinol...
FMICS
2010
Springer
15 years 5 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
175
Voted
TSMC
2010
14 years 11 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...
191
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
IPCCC
2005
IEEE
15 years 10 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi