Sciweavers

3887 search results - page 461 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks
Abstract— Sensors typically use wireless transmitters to communicate with each other. However, sensors may be located in a way that they cannot even form a connected network (e.g...
Abhishek Kashyap, Samir Khuller, Mark A. Shayman
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
JCM
2008
69views more  JCM 2008»
15 years 4 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
ICRA
2008
IEEE
133views Robotics» more  ICRA 2008»
15 years 10 months ago
Deployment algorithms for a power-constrained mobile sensor network
Abstract— This paper presents coverage algorithms for mobile sensor networks in which agents have limited power to move. Rather than making use of a constrained optimization tech...
Andrew Kwok, Sonia Martínez
PIMRC
2008
IEEE
15 years 10 months ago
Overcoming radio link asymmetry in wireless sensor networks
— We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy effici...
Ren Ping Liu, Zvi Rosberg, Iain B. Collings, Carol...