Sciweavers

3426 search results - page 524 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
144
Voted
COMCOM
2007
149views more  COMCOM 2007»
15 years 3 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
115
Voted
JPDC
2007
77views more  JPDC 2007»
15 years 3 months ago
Location-centric storage for safety warning based on roadway sensor networks
We propose a novel vision for roadway safety warning based on sensor networks, aiming at providing user-friendly zero-delay safety warnings to motorists. Our idea leverages the ad...
Kai Xing, Xiuzhen Cheng, Fang Liu, Shmuel Rotenstr...
106
Voted
UIST
2003
ACM
15 years 8 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley
134
Voted
PERVASIVE
2004
Springer
15 years 9 months ago
A Distributed Precision Based Localization Algorithm for Ad-Hoc Networks
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the dista...
Leon Evers, Stefan Dulman, Paul J. M. Havinga
143
Voted
TDSC
2010
102views more  TDSC 2010»
15 years 1 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia