Sciweavers

2333 search results - page 78 / 467
» Power-aware Node Deployment in Wireless Sensor Networks
Sort
View
WCNC
2010
IEEE
15 years 1 months ago
Deploying Wireless Sensors for Differentiated Coverage and Probabilistic Connectivity
—The deployment strategy for achieving differentiated coverage and probabilistic connectivity in wireless sensor networks is studied in this paper. A novel solution based on elit...
Yanjun Li, Ye-Qiong Song, Yi-hua Zhu, René ...
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
15 years 10 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
GIS
2010
ACM
14 years 8 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
INFOCOM
2009
IEEE
15 years 4 months ago
Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks
— The proliferation of wireless and mobile devices has fostered the demand of context aware applications, in which location is often viewed as one of the most significant context...
Zheng Yang, Yunhao Liu, Xiang-Yang Li
JSAC
2010
188views more  JSAC 2010»
14 years 4 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...