Sciweavers

1850 search results - page 18 / 370
» On the Sensitivity of Sensor Network Simulations
Sort
View
101
Voted
GI
2005
Springer
15 years 6 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
121
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao
85
Voted
WSC
2004
15 years 1 months ago
Localization Using Discrete Event Simulation
In this paper, we focus on the implementation of a localization algorithm for sensor networks using a discrete event simulation (DES) architecture. In this implementation, DES is ...
Baybora Aksoy, Volkan Ustun, Jeffrey S. Smith
121
Voted
MOBIHOC
2010
ACM
14 years 10 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang
78
Voted
IPSN
2005
Springer
15 years 6 months ago
Experiences and directions in pushpin computing
— Over the last three years we have built and experimented with the Pushpin Computing wireless sensor network platform. The Pushpin platform is a tabletop multihop wireless senso...
Joshua Lifton, Michael Broxton, Joseph A. Paradiso