Sciweavers

2268 search results - page 165 / 454
» Modeling wireless shadow networks
Sort
View
TMC
2012
13 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TWC
2010
14 years 11 months ago
A framework for statistical wireless spectrum occupancy modeling
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...
DCOSS
2005
Springer
15 years 10 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
WIS
2004
15 years 6 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
145
Voted
EWSN
2006
Springer
16 years 4 months ago
Power Management for Bluetooth Sensor Networks
Low power is a primary concern in the field of wireless sensor networks. Bluetooth has often been labeled as an inappropriate technology in this field due to its high power consump...
Luca Negri, Lothar Thiele