Sciweavers

3426 search results - page 553 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
156
Voted
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
15 years 9 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
PERCOM
2007
ACM
16 years 3 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
SENSYS
2006
ACM
15 years 9 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
160
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang
ESA
2004
Springer
97views Algorithms» more  ESA 2004»
15 years 8 months ago
Radio Network Clustering from Scratch
Abstract. We propose a novel randomized algorithm for computing a dominating set based clustering in wireless ad-hoc and sensor networks. The algorithm works under a model which ca...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer