Sciweavers

3887 search results - page 288 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
164
Voted
ICC
2011
IEEE
257views Communications» more  ICC 2011»
14 years 3 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
IPSN
2005
Springer
15 years 9 months ago
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
— Sensor networks pose security and privacy challenges. One challenge is how to bootstrap secure communications among nodes. Several key pre-distribution schemes have been propos...
Zhen Yu, Yong Guan
FORTE
2010
15 years 5 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...
131
Voted
ISPAN
2009
IEEE
15 years 10 months ago
Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness
— This paper presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Networks (WSN) and geostatistical analysis for total spatial awar...
Charles C. Castello, Jeffrey Fan, Asad Davari, Rue...
GLOBECOM
2007
IEEE
15 years 10 months ago
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
— In Wireless Sensor Networks (WSNs), symmetric key schemes may be used to provide security. Recently, a class of random key pre-distribution techniques have been proposed and in...
Jing Deng, Yunghsiang S. Han