Sciweavers

2642 search results - page 171 / 529
» Robust node localization for wireless sensor networks
Sort
View
137
Voted
SIGMOD
2003
ACM
116views Database» more  SIGMOD 2003»
16 years 3 months ago
Multimedia streaming in large-scale sensor networks with mobile swarms
Abstract-- Sensor networking technologies have developed very rapidly in the last ten years. In many situations, high quality multimedia streams may be required for providing detai...
Mario Gerla, Kaixin Xu
134
Voted
EUC
2006
Springer
15 years 7 months ago
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and ...
Jens-Peter Kaps, Berk Sunar
203
Voted
IPPS
2006
IEEE
15 years 9 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
150
Voted
WISEC
2009
ACM
15 years 10 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
133
Voted
ISCAS
2003
IEEE
156views Hardware» more  ISCAS 2003»
15 years 8 months ago
GNOMES: a testbed for low power heterogeneous wireless sensor networks
Continuing trends in sensor, semiconductor and communication systems technology (smaller, faster, cheaper) make feasible very dense networks of fixed and mobile wireless devices ...
Erik Welsh, Walt Fish, J. Patrick Frantz