Sciweavers

3426 search results - page 266 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
156
Voted
DCOSS
2011
Springer
14 years 4 months ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson
122
Voted
WCE
2007
15 years 5 months ago
Applications of Wireless Sensor Networks
— Wireless Sensor Networks (WSNs) are spreading around in multiple fields of applications because they perform measuring tasks in a flexible way. This paper presents a survey on ...
João Miguel Ferro, Luís M. Borges, F...
116
Voted
ICCS
2007
Springer
15 years 10 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong
140
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Understanding Node Localizability of Wireless Ad-hoc Networks
— Location awareness is highly critical for wireless ad-hoc and sensor networks. Many efforts have been made to solve the problem of whether or not a network can be localized. Ne...
Zheng Yang, Yunhao Liu
PODC
2009
ACM
15 years 9 months ago
Brief announcement: locality-based aggregate computation in wireless sensor networks
We present DRR-gossip, an energy-efficient and robust aggregate computation algorithm in wireless sensor networks. We prove that the DRR-gossip algorithm requires O(n) messages a...
Jen-Yeu Chen, Gopal Pandurangan, Jianghai Hu