Sciweavers

3426 search results - page 283 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
INFFUS
2008
119views more  INFFUS 2008»
15 years 4 months ago
A scalable correlation aware aggregation strategy for wireless sensor networks
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in consid...
Yujie Zhu, Ramanuja Vedantham, Seung-Jong Park, Ra...
JNW
2008
123views more  JNW 2008»
15 years 4 months ago
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks
- We present a new protocol for reliable data transfer in time-critical applications with zero tolerance for data loss in wireless sensor networks which uses less time and fewer me...
Damayanti Datta, Sukhamay Kundu
ITICSE
2010
ACM
15 years 5 months ago
Hands-on approach to teaching wireless sensor networks at the undergraduate level
Teaching wireless sensor networks (WSNs) at the undergraduate level is both challenging and rewarding. WSNs include low-level programming and debugging, power-aware operations, no...
Anna Förster, Mehdi Jazayeri
149
Voted
SECON
2007
IEEE
15 years 11 months ago
Approximation Algorithm for Base Station Placement in Wireless Sensor Networks
Base station location has significant impact on network lifetime performance for a sensor network. For a multihop sensor network, this problem is particular challenging as we need ...
Yi Shi, Yiwei Thomas Hou
WDAG
2004
Springer
144views Algorithms» more  WDAG 2004»
15 years 10 months ago
Contention-Free MAC Protocols for Wireless Sensor Networks
Abstract. A MAC protocol specifies how nodes in a sensor network access a shared communication channel. Desired properties of such MAC protocol are: it should be distributed and c...
Costas Busch, Malik Magdon-Ismail, Fikret Sivrikay...