Sciweavers

4985 search results - page 272 / 997
» Re-Configurable Computing in Wireless
Sort
View
121
Voted
PERCOM
2009
ACM
15 years 11 months ago
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks
—Due to the unattended nature of wireless sensor networks, an adversary can easily capture and compromise sensor nodes, generate replicas of those compromised nodes, and mount a ...
Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K....
CSE
2009
IEEE
15 years 11 months ago
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks
The most advanced logistics solutions that are currently adopted in ports and terminals use RFID- and GPS-based technologies to identify and localize shipping containers in the ya...
Stefano Abbate, Marco Avvenuti, Paolo Corsini, Ale...
129
Voted
CSE
2009
IEEE
15 years 11 months ago
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
We present a deterministic Key Predistribution scheme in Wireless Sensor Networks (WSN) using combinatorial designs. The design finds application where a large number sensor node...
Sushmita Ruj, Jennifer Seberry, Bimal K. Roy
113
Voted
ICDCS
2008
IEEE
15 years 11 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
121
Voted
ICDCSW
2008
IEEE
15 years 11 months ago
Mobility Control for Complete Coverage in Wireless Sensor Networks
In this paper, we propose a new control method to cover the “holes” in wireless sensor networks. Many applications often face the problem of holes when some sensor nodes are d...
Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz