Sciweavers

3426 search results - page 295 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
ISCC
2009
IEEE
106views Communications» more  ISCC 2009»
15 years 11 months ago
Multivariate reduction in wireless sensor networks
In wireless sensor networks, energy consumption is generally associated with the amount of sent data once communication is the activity of the network that consumes more energy. T...
Orlando Silva Junior, André L. L. de Aquino...
FTDCS
2003
IEEE
15 years 10 months ago
Using a Distributed Snapshot Algorithm in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have particular characteristics that do not allow to apply traditional distributed algorithms directly to them. In this work we adapt the algorithm...
Ana Paula R. da Silva, Fernando A. Teixeira, Rafae...
PERCOM
2005
ACM
16 years 4 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
ICCCN
2007
IEEE
15 years 11 months ago
Channel-Specific Wireless Sensor Network Path Data
—Channel-specific path data for a 44-node 2.4 GHz wireless sensor network deployed in an industrial setting is presented. Each node generates one data packet every 28 seconds wit...
Lance Doherty, William Lindsay, Jonathan Simon
CCR
2008
112views more  CCR 2008»
15 years 5 months ago
Empirical evaluation of querying mechanisms for unstructured wireless sensor networks
In the last few years, several studies have analyzed the performance of flooding and random walks as querying mechanisms for unstructured wireless sensor networks. However, most o...
Joon Ahn, Shyam Kapadia, Sundeep Pattem, Avinash S...