Sciweavers

832 search results - page 145 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
SENSYS
2003
ACM
15 years 2 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
87
Voted
LCN
2008
IEEE
15 years 3 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...
PEWASUN
2007
ACM
14 years 11 months ago
Analysis of the impact of hello protocol parameters over a wireless network self-organization
The neighborhood discovery and its maintenance are very important in wireless networks for any applications, especially for routing and every self-∗ algorithm. Neighbor nodes ar...
Tahiry Razafindralambo, Nathalie Mitton
DCOSS
2007
Springer
15 years 3 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan
DASC
2006
IEEE
15 years 3 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu