Sciweavers

1850 search results - page 95 / 370
» On the Sensitivity of Sensor Network Simulations
Sort
View
80
Voted
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
113
Voted
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 7 months ago
Interplay Between Routing and Distributed Source Coding in Wireless Sensor Network
—Recent Advances in Distributed Source Coding (DSC) for mission-driven Wireless Sensor Networks (WSN) are related to the coding for multiple correlated sensors in applications su...
Honggang Wang, Dongming Peng, Wei Wang 0015, Hamid...
115
Voted
CDC
2010
IEEE
128views Control Systems» more  CDC 2010»
14 years 7 months ago
Greedy sensor selection: Leveraging submodularity
ACT We consider the problem of sensor selection in resource constrained sensor networks. The fusion center selects a subset of k sensors from an available pool of m sensors accordi...
Manohar Shamaiah, Siddhartha Banerjee, Haris Vikal...
CMOT
2002
112views more  CMOT 2002»
15 years 16 days ago
Finding Optimal Targets for Change Agents: A Computer Simulation of Innovation Diffusion
We introduce a diffusion of innovation model based on a network threshold approach. Realistic network and threshold data were gathered regarding the diffusion of new software tool...
Dirk Maienhofer, Thomas A. Finholt
105
Voted
MOBIHOC
2006
ACM
15 years 6 months ago
Wakeup scheduling in wireless sensor networks
A large number of practical sensing and actuating applications require immediate notification of rare but urgent events and also fast delivery of time sensitive actuation command...
Abtin Keshavarzian, Huang Lee, Lakshmi Venkatraman