Sciweavers

688 search results - page 125 / 138
» Random key-assignment for secure Wireless Sensor Networks
Sort
View
VTC
2010
IEEE
162views Communications» more  VTC 2010»
14 years 10 months ago
Performance Evaluation of Joint Network-Channel Coding under a Real Network Topology Model
— Adaptive network coded cooperation (ANCC) has been proposed as an effective scheme to combine network and channel coding for cooperative wireless networks by matching network-o...
Kun Pang, Zihuai Lin, Yonghui Li, Branka Vucetic
DCOSS
2006
Springer
15 years 3 months ago
GIST: Group-Independent Spanning Tree for Data Aggregation in Dense Sensor Networks
Abstract. Today, there exist many algorithms and protocols for constructing agregation or dissemination trees for wireless sensor networks that are optimal (for different notions o...
Lujun Jia, Guevara Noubir, Rajmohan Rajaraman, Rav...
PERCOM
2003
ACM
15 years 11 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
MOBICOM
2003
ACM
15 years 5 months ago
Range-free localization schemes for large scale sensor networks
Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent...
Tian He, Chengdu Huang, Brian M. Blum, John A. Sta...
93
Voted
IPSN
2005
Springer
15 years 5 months ago
Geographic routing with limited information in sensor networks
Geographic routing with greedy relaying strategies have been widely studied as a routing scheme in sensor networks. These schemes assume that the nodes have perfect information ab...
Sundar Subramanian, Sanjay Shakkottai