Sciweavers

3426 search results - page 290 / 686
» Self-identifying sensor data
Sort
View
GI
2005
Springer
15 years 10 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
VLDB
2005
ACM
112views Database» more  VLDB 2005»
15 years 10 months ago
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks
This paper presents a set of algorithms for efficiently evaluating join queries over static data tables in sensor networks. We describe and evaluate three algorithms that take adv...
Daniel J. Abadi, Samuel Madden, Wolfgang Lindner
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
16 years 5 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
DCOSS
2005
Springer
15 years 10 months ago
A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks
Abstract. Achieving optimal battery usage and prolonged network lifetime are two of the most fundamental issues in wireless sensor networks. By exploiting node and data redundancy ...
Amitabha Ghosh, Sajal K. Das
DMSN
2009
ACM
15 years 11 months ago
Extracting tennis statistics from wireless sensing environments
Creating statistics from sporting events is now widespread with most efforts to automate this process using various sensor devices. The problem with many of these statistical app...
Adel Shaeib, Kenneth Conroy, Mark Roantree