Sciweavers

657 search results - page 100 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
COMCOM
2007
156views more  COMCOM 2007»
14 years 9 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
ICCV
2003
IEEE
15 years 11 months ago
Counting People in Crowds with a Real-Time Network of Simple Image Sensors
Estimating the number of people in a crowded environment is a central task in civilian surveillance. Most vision-based counting techniques depend on detecting individuals in order...
Danny B. Yang, Héctor H. González-Ba...
ICNP
2009
IEEE
14 years 7 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
MSWIM
2009
ACM
15 years 4 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
GLOBECOM
2008
IEEE
15 years 4 months ago
Link Rate Allocation under Bandwidth and Energy Constraints in Sensor Networks
—In sensor networks, both energy and bandwidth are scarce resources. In the past, many energy efficient routing algorithms have been devised in order to maximize network lifetim...
Maggie X. Cheng, Xuan Gong, Lin Cai