Sciweavers

3887 search results - page 93 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
105
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
109
Voted
GLOBECOM
2007
IEEE
15 years 8 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
ICRA
2008
IEEE
144views Robotics» more  ICRA 2008»
15 years 8 months ago
Decentralized mapping of robot-aided sensor networks
— A key problem in deploying sensor networks in real-world applications is that of mapping, i.e. determining the location of each sensor such that subsequent tasks such as tracki...
Joseph Djugash, Sanjiv Singh, Ben Grocholsky
117
Voted
TCS
2008
15 years 2 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
107
Voted
MOBIHOC
2003
ACM
16 years 1 months ago
Localization from mere connectivity
It is often useful to know the geographic positions of nodes in a communications network, but adding GPS receivers or other sophisticated sensors to every node can be expensive. W...
Yi Shang, Wheeler Ruml, Ying Zhang, Markus P. J. F...