Sciweavers

3009 search results - page 567 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
SENSYS
2004
ACM
15 years 5 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...
GLOBECOM
2008
IEEE
15 years 6 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar
IJRFITA
2007
114views more  IJRFITA 2007»
14 years 11 months ago
Semi-passive RFID and beyond: steps towards automated quality tracing in the food chain
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
Reiner Jedermann, Walter Lang
ROBIO
2006
IEEE
217views Robotics» more  ROBIO 2006»
15 years 5 months ago
Modular software architecture for teams of cooperating, heterogeneous robots
— For teams of cooperating autonomous lightweight robots with challenging dynamical locomotion properties a platform independent modular software architecture and platform indepe...
Martin Friedmann, Jutta Kiener, Sebastian Petters,...
MSWIM
2006
ACM
15 years 5 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt