Sciweavers

3887 search results - page 121 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
PCI
2009
Springer
15 years 7 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
109
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Higher dimensional consensus algorithms in sensor networks
This paper introduces higher dimensional consensus, a framework to capture a number of different, but, related distributed, iterative, linear algorithms of interest in sensor netw...
Usman A. Khan, Soummya Kar, José M. F. Mour...
TC
2002
15 years 2 months ago
Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks
We present novel grid coverage strategies for effective surveillance and target location in distributed sensor networks. We represent the sensor field as a grid (two or three-dimen...
Krishnendu Chakrabarty, S. Sitharama Iyengar, Hair...
SECON
2010
IEEE
15 years 7 days ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
WISEC
2010
ACM
15 years 6 days ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu