Sciweavers

3887 search results - page 475 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
INFOCOM
2005
IEEE
15 years 9 months ago
PIKE: peer intermediaries for key establishment in sensor networks
— The establishment of shared cryptographic keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of asymmetric key crypt...
Haowen Chan, Adrian Perrig
CCE
2007
15 years 4 months ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
133
Voted
IJSNET
2008
114views more  IJSNET 2008»
15 years 4 months ago
PERT: a new power-efficient real-time packet delivery scheme for sensor networks
Abstract: We present PERT, a power-efficient scheme to deliver real-time data packets in sensor networks. Time-sensitive sensor data is common in applications such as hazard monito...
Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar
SIGSOFT
2007
ACM
16 years 4 months ago
Program representations for testing wireless sensor network applications
Because of the growing complexity of wireless sensor network applications (WSNs), traditional software development tools are being developed that are specifically designed for the...
Nguyet T. M. Nguyen, Mary Lou Soffa
EWSN
2007
Springer
16 years 3 months ago
Approximate Initialization of Camera Sensor Networks
Camera sensor networks--wireless networks of low-power imaging sensors--have become popular recently for monitoring applications. In this paper, we argue that traditional vision-ba...
Purushottam Kulkarni, Prashant J. Shenoy, Deepak G...