Sciweavers

2642 search results - page 241 / 529
» Robust node localization for wireless sensor networks
Sort
View
MOBIHOC
2001
ACM
16 years 4 months ago
Distributed assignment of encoded MAC addresses in sensor networks
In wireless sensor networks, the vast majority of wide-scale traffic consists of only a few bytes, including all network and application layer IDs. Therefore, MAC addresses, which...
Curt Schurgers, Gautam Kulkarni, Mani B. Srivastav...
ICDCS
2009
IEEE
16 years 1 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
ESAS
2006
Springer
15 years 8 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
IEEEIAS
2008
IEEE
15 years 10 months ago
Network Level Privacy for Wireless Sensor Networks
Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
ADHOCNOW
2006
Springer
15 years 10 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou