Sciweavers

2099 search results - page 156 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
73
Voted
JHSN
2006
95views more  JHSN 2006»
14 years 10 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
CONEXT
2006
ACM
15 years 4 months ago
A WSN platform to support middleware development
According to the application domain, Wireless Sensor Networks (WSNs) differ in a number of ways (e. g., deployment strategy, node mobility, available resources, node heterogeneity...
André Rodrigues
108
Voted
FI
2010
175views more  FI 2010»
14 years 7 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
CORR
2008
Springer
175views Education» more  CORR 2008»
14 years 10 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...
119
Voted
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 8 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...