Sciweavers

3009 search results - page 562 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
ADHOC
2010
173views more  ADHOC 2010»
14 years 8 months ago
A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation
Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors wit...
Harish Sethu, Thomas Gerety
CODES
2008
IEEE
15 years 6 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
TMC
2011
119views more  TMC 2011»
14 years 6 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
SENSYS
2003
ACM
15 years 5 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
PERCOM
2006
ACM
15 years 11 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik