Sciweavers

3426 search results - page 134 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
161
Voted
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 10 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
140
Voted
ITCC
2005
IEEE
15 years 9 months ago
Zonal Rumor Routing for Wireless Sensor Networks
has to be relayed to nodes interested in those events. Moreover, nodes may also generate queries to find events they are interested in. Thus there is a need to route the informatio...
Tarun Banka, Gagan Tandon, Anura P. Jayasumana
129
Voted
IPSN
2009
Springer
15 years 10 months ago
Archetype-based design: Sensor network programming for application experts, not just programming experts
Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and ...
Lan S. Bai, Robert P. Dick, Peter A. Dinda
138
Voted
ALGOSENSORS
2004
Springer
15 years 9 months ago
On the Computational Complexity of Sensor Network Localization
Determining the positions of the sensor nodes in a network is essential to many network functionalities such as routing, coverage and tracking, and event detection. The localizatio...
James Aspnes, David Kiyoshi Goldenberg, Yang Richa...
148
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao