Sciweavers

3426 search results - page 106 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
177
Voted
WIOPT
2006
IEEE
15 years 9 months ago
Scheduling sensor activity for point information coverage in wireless sensor networks
Abstract— An important application of wireless sensor networks is to perform the monitoring missions, for example, to monitor some targets of interests at all times. Sensors are ...
Bang Wang, Kee Chaing Chua, Vikram Srinivasan, Wei...
134
Voted
EUC
2006
Springer
15 years 7 months ago
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are slowly being integrated into our infrastructure and ...
Jens-Peter Kaps, Berk Sunar
149
Voted
IPSN
2010
Springer
15 years 23 days ago
i-MAC - a MAC that learns
Traffic patterns in manufacturing machines exhibit strong temporal correlations due to the underlying repetitive nature of their operations. A MAC protocol can potentially learn t...
Krishna Kant Chintalapudi
129
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Deployment analysis in underwater acoustic wireless sensor networks
In this paper, different deployment strategies for two-dimensional and three-dimensional communication architectures for UnderWater Acoustic Sensor Networks (UW-ASNs) are proposed...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
138
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks
In wireless sensor networks (WSNs), a good sensor deployment method is vital to the quality of service (QoS) provided by WSNs. This QoS depends on the coverage of the monitoring a...
Jie Wu, Shuhui Yang