Sciweavers

3009 search results - page 511 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
SENSYS
2003
ACM
15 years 5 months ago
Practical lazy scheduling in sensor networks
Experience has shown that the power consumption of sensors and other wireless computational devices is often dominated by their communication patterns. We present a practical real...
Ramana Rao Kompella, Alex C. Snoeren
VTC
2006
IEEE
116views Communications» more  VTC 2006»
15 years 5 months ago
Distributed Estimation in a Power Constrained Sensor Network
— This paper derives the optimum non-uniform quantization scheme for a distributed estimation problem based on noisy observations in a wireless sensor network. The optimal quanti...
Visvakumar Aravinthan, Sudharman K. Jayaweera, Kos...
PEWASUN
2005
ACM
15 years 5 months ago
Three-dimensional routing in underwater acoustic sensor networks
Underwater sensor networks will find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation, and tact...
Dario Pompili, Tommaso Melodia
ACMSE
2006
ACM
15 years 5 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
FGCN
2007
IEEE
164views Communications» more  FGCN 2007»
15 years 1 months ago
Future Application Scenarios for MANET-Based Intelligent Transportation Systems
Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electroni...
Chai-Keong Toh