Sciweavers

3426 search results - page 527 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
131
Voted
MSWIM
2003
ACM
15 years 8 months ago
Connectivity of wireless multihop networks in a shadow fading environment
This article analyzes the connectivity of multihop radio networks in a log-normal shadow fading environment. Assuming the nodes have equal transmission capabilities and are randoml...
Christian Bettstetter, Christian Hartmann
145
Voted
MOBICOM
2012
ACM
13 years 6 months ago
Locating in fingerprint space: wireless indoor localization with little human intervention
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a proce...
Zheng Yang, Chenshu Wu, Yunhao Liu
235
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
127
Voted
PERCOM
2009
ACM
15 years 10 months ago
A Letter Soup for the Quality of Information in Sensor Networks
—In this paper, an information grouping paradigm for QoI in sensor networks is introduced. First, a definition of QoI is presented by analyzing the ITU’s definition of QoS. T...
Chatschik Bisdikian, Joel W. Branch, Kin K. Leung,...
172
Voted
PERCOM
2005
ACM
15 years 9 months ago
A Distributed System for Answering Range Queries on Sensor Network Data
A distributed system for approximate query answering on sensor network data is proposed, where a suitable compression technique is exploited to represent data and support query an...
Alfredo Cuzzocrea, Filippo Furfaro, Sergio Greco, ...