Sciweavers

283 search results - page 44 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
125
Voted
OPODIS
2004
14 years 11 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
PERCOM
2006
ACM
15 years 9 months ago
Dominating Connectivity and Reliability of Heterogeneous Sensor Networks
Consider a placement of heterogeneous, wireless sensors that can vary the transmission range by increasing or decreasing power. The problem of determining an optimal assignment of ...
Kenneth A. Berman, Fred S. Annexstein, Aravind Ran...
110
Voted
TMC
2012
13 years 19 days ago
Elevator-Assisted Sensor Data Collection for Structural Health Monitoring
—Sensor networks nowadays are widely used for structural health monitoring; for example, the sensor monitoring system deployed on the Guangzhou New TV Tower, China. While wired s...
Tao Zhang, Dan Wang, Jiannong Cao, Yi Qing Ni, Lij...
78
Voted
TPDS
2010
86views more  TPDS 2010»
14 years 8 months ago
Quality of Trilateration: Confidence-Based Iterative Localization
The proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multilateration, as a bas...
Zheng Yang, Yunhao Liu
105
Voted
SIGMETRICS
2004
ACM
206views Hardware» more  SIGMETRICS 2004»
15 years 3 months ago
Performance aware tasking for environmentally powered sensor networks
The use of environmental energy is now emerging as a feasible energy source for embedded and wireless computing systems such as sensor networks where manual recharging or replacem...
Aman Kansal, Dunny Potter, Mani B. Srivastava