Sciweavers

4189 search results - page 577 / 838
» On the Security of Wireless Sensor Networks
Sort
View
IPSN
2010
Springer
14 years 8 months ago
i-MAC - a MAC that learns
Traffic patterns in manufacturing machines exhibit strong temporal correlations due to the underlying repetitive nature of their operations. A MAC protocol can potentially learn t...
Krishna Kant Chintalapudi
UBIMOB
2009
ACM
225views Management» more  UBIMOB 2009»
15 years 3 months ago
Historical data storage for large scale sensor networks
Wireless sensor networks are rapidly finding their way through a plethora of new applications like precision farming and forestry, with increasing network scale, system complexit...
Loïc Petit, Abdelhamid Nafaa, Raja Jurdak
WSNA
2003
ACM
15 years 4 months ago
Information assurance in sensor networks
Sensor networks are deployed to monitor the surroundings and keep the end-user informed about the events witnessed. Different types of events have different levels of importance f...
Budhaditya Deb, Sudeept Bhatnagar, Badri Nath
ESAS
2007
Springer
15 years 5 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
ICCCN
2008
IEEE
15 years 5 months ago
An Empirical Energy Model for Supercapacitor Powered Wireless Sensor Nodes
—The modeling of energy components in Wireless Sensor Network (WSN) simulation is important for obtaining realistic lifetime predictions and ensuring the faithful operation of en...
Geoff V. Merrett, Alex S. Weddell, A. P. Lewis, Ni...