Sciweavers

283 search results - page 47 / 57
» Practical ID-based encryption for wireless sensor network
Sort
View
PERCOM
2008
ACM
16 years 2 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
ICDCSW
2008
IEEE
15 years 9 months ago
Design and Implementation of a WSN-Based Intelligent Light Control System
—Recently, wireless sensor networks (WSNs) have been widely discussed in many applications. In this paper, we propose a WSN-based intelligent light control system for indoor envi...
Meng-Shiuan Pan, Lun-Wu Yeh, Yen-Ann Chen, Yu-Hsua...
TPDS
2008
196views more  TPDS 2008»
15 years 3 months ago
End-to-End Energy Management in Networked Real-Time Embedded Systems
Recent technological advances have opened up a wide range of distributed real-time applications involving battery-driven embedded devices with local processing and wireless communi...
G. Sudha Anil Kumar, Govindarasu Manimaran, Zhengd...
WH
2010
171views Healthcare» more  WH 2010»
14 years 10 months ago
Evaluation of body sensor network platforms: a design space and benchmarking analysis
Body Sensor Networks (BSNs) consist of sensor nodes deployed on the human body for health monitoring. Each sensor node is implemented by interfacing a physiological sensor with a ...
Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta...
136
Voted
MOBISYS
2006
ACM
16 years 2 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...