Sciweavers

5815 search results - page 11 / 1163
» Self-monitoring for sensor networks
Sort
View
WINET
2010
179views more  WINET 2010»
14 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
ICASSP
2011
IEEE
14 years 1 months ago
Ordering for energy efficient estimation and optimization in sensor networks
A discretized version of a continuous optimization problem is considered for the case where data is obtained from a set of dispersed sensor nodes and the overall metric is a sum o...
Rick S. Blum
77
Voted
JDCTA
2010
186views more  JDCTA 2010»
14 years 4 months ago
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms
The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challe...
Mojtaba Romoozi, Hossein Ebrahimpour-Komleh