Sciweavers

1423 search results - page 136 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 8 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
ACSAC
2006
IEEE
15 years 4 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
68
Voted
SENSYS
2006
ACM
15 years 4 months ago
Virtual high-resolution for sensor networks
The resolution at which a sensor network collects data is a crucial parameter of performance since it governs the range of applications that are feasible to be developed using tha...
Aman Kansal, William J. Kaiser, Gregory J. Pottie,...
WOWMOM
2006
ACM
149views Multimedia» more  WOWMOM 2006»
15 years 4 months ago
On-Demand Reliable Medium Access in Sensor Networks
A wireless sensor network typically consists of a dense deployment of sensor nodes to achieve higher resolution and better network coverage. A dense network also increases the fau...
Ratnabali Biswas, Vivek Jain, Chittabrata Ghosh, D...
85
Voted
IJHPCN
2006
116views more  IJHPCN 2006»
14 years 10 months ago
Implications of application usage characteristics for collective communication offload
Abstract-- The performance of collective communication operations is known to have a significant impact on the scalability of some applications. Indeed, the global, synchronous nat...
Ron Brightwell, Sue Goudy, Arun Rodrigues, Keith D...