Sciweavers

2476 search results - page 329 / 496
» Robust Distributed Optimization in Wireless Sensor Network
Sort
View
120
Voted
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
161
Voted
ICC
2011
IEEE
257views Communications» more  ICC 2011»
14 years 3 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
MOBICOM
2006
ACM
15 years 9 months ago
OURS: optimal unicast routing systems in non-cooperative wireless networks
We propose novel solutions for unicast routing in wireless networks consisted of selfish terminals: in order to alleviate the inevitable over-payment problem (and thus economic i...
Weizhao Wang, Xiang-Yang Li, Stephan Eidenbenz, Yu...
WETICE
2003
IEEE
15 years 8 months ago
On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems
We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Prasenjit Dey, Anwitaman Datta
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 5 months ago
Towards Efficient Processing of General-Purpose Joins in Sensor Networks
Abstract-- Join processing in wireless sensor networks is difficult: As the tuples can be arbitrarily distributed within the network, matching pairs of tuples is communication inte...
Erik Buchmann, Klemens Böhm, Mirco Stern