Sciweavers

3426 search results - page 86 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
140
Voted
COMCOM
2007
104views more  COMCOM 2007»
15 years 3 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
136
Voted
AINA
2007
IEEE
15 years 9 months ago
An Efficient Scheme for User Authentication in Wireless Sensor Networks
This paper presents a distributed user authentication scheme in wireless sensor networks. Our scheme is based on the self-certified keys cryptosystem (SCK), and we have modified i...
Canming Jiang, Bao Li, Haixia Xu
107
Voted
PERCOM
2008
ACM
16 years 3 months ago
Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor Networks
In this paper, we investigate the problem of resource constraints in Mobile Peer-to-Peer Wireless Sensor Networks (MP2P WSNs). We propose a scheme to load share tasks among peer s...
Elisa Rondini, Stephen Hailes, Li Li
ADHOC
2008
96views more  ADHOC 2008»
15 years 3 months ago
Network configuration for optimal utilization efficiency of wireless sensor networks
This paper addresses the problem of configuring wireless sensor networks (WSNs). Specifically, we seek answers to the following questions: how many sensors should be deployed, wha...
Yunxia Chen, Chen-Nee Chuah, Qing Zhao
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
16 years 4 months ago
Online Latent Variable Detection in Sensor Networks
Sensor networks attract increasing interest, for a broad range of applications. Given a sensor network, one key issue becomes how to utilize it efficiently and effectively. In par...
Jimeng Sun, Spiros Papadimitriou, Christos Falouts...