Sciweavers

4189 search results - page 572 / 838
» On the Security of Wireless Sensor Networks
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
SENSYS
2009
ACM
15 years 6 months ago
Wildlife and environmental monitoring using RFID and WSN technology
bstract: Wildlife and Environmental Monitoring using RFID and WSN Technology Vladimir Dyo1, Stephen A. Ellwood2, David W. Macdonald2, Andrew Markham3 Cecilia Mascolo4, Bence P´asz...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
ICCCN
2007
IEEE
15 years 5 months ago
A SpaceTime Oriented Macroprogramming Paradigm for Push-Pull Hybrid Sensor Networking
This paper proposes a spatio-temporal macroprogramming paradigm for push-pull hybrid wireless sensor networks (WSNs). The proposed paradigm, called SpaceTime Oriented Programming ...
Hiroshi Wada, Pruet Boonma, Junichi Suzuki
ACMACE
2009
ACM
15 years 9 days ago
Developing multiplayer pervasive games and networked interactive installations using ad hoc mobile sensor nets
We here present Fun in Numbers (FinN), a framework for developing pervasive applications and interactive installations for entertainment and educational purposes. Using ad hoc mob...
Orestis Akribopoulos, Marios Logaras, Nikos Vasila...
FMICS
2010
Springer
14 years 11 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó