Sciweavers

3426 search results - page 237 / 686
» Self-monitoring of wireless sensor networks
Sort
View
140
Voted
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
15 years 3 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
INFOCOM
2005
IEEE
15 years 7 months ago
Secure positioning of wireless devices with application to sensor networks
Abstract— So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning tec...
Srdjan Capkun, Jean-Pierre Hubaux
126
Voted
COMCOM
2007
124views more  COMCOM 2007»
15 years 1 months ago
Path planning of mobile landmarks for localization in wireless sensor networks
Many applications of wireless sensor networks require the sensor nodes to obtain their locations. The main idea in most localization methods has been that some nodes with known co...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
TSP
2008
103views more  TSP 2008»
15 years 1 months ago
Distributed Adaptive Quantization for Wireless Sensor Networks: From Delta Modulation to Maximum Likelihood
Abstract-- We consider distributed parameter estimation using quantized observations in wireless sensor networks where due to bandwidth constraint, each sensor quantizes its local ...
Jun Fang, Hongbin Li
115
Voted
ICDCSW
2003
IEEE
15 years 7 months ago
Garnet: A Middleware Architecture for Distributing Data Streams Originating in Wireless Sensor Networks
We present an architectural framework, Garnet, which a data stream centric abstraction to encourage the manipulation and exploitation of data generated in sensor networks. By prov...
Lyndell St. Ville, Peter Dickman