Sciweavers

4189 search results - page 606 / 838
» On the Security of Wireless Sensor Networks
Sort
View
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
15 years 11 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
IEEECIT
2010
IEEE
14 years 9 months ago
Concept and Prototype for a Real-Time Enabled Publish/Subscribe System
—Distributed computing systems often strive to decouple their communicating components (threads on a single node, or nodes in a network) from each other with respect to time, spa...
Matthias Andree, Alexander Gebel, Holger Karl
TMC
2010
250views more  TMC 2010»
14 years 9 months ago
Duty Cycle Control for Low-Power-Listening MAC Protocols
Energy efficiency is of the utmost importance in wireless sensor networks. The family of low-power-listening MAC protocols was proposed to reduce one form of energy dissipation...
Christophe J. Merlin, Wendi Beth Heinzelman
DCOSS
2008
Springer
15 years 26 days ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
HPCC
2007
Springer
15 years 5 months ago
A Data Imputation Model in Sensor Databases
Data missing is a common problem in database query processing, which can cause bias or lead to inefficient analyses, and this problem happens more often in sensor databases. The re...
Nan Jiang