Sciweavers

5813 search results - page 140 / 1163
» Sensor Networks
Sort
View
SUTC
2010
IEEE
15 years 7 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
127
Voted
ISCC
2006
IEEE
15 years 9 months ago
Using Web Services for Bridging End-User Applications and Wireless Sensor Networks
Applications are the ultimate consumers of the information collected by sensors. There exist several frameworks for the interactions between end-user applications and sensors. They...
Truong Ta, Nuru Yakub Othman, Roch H. Glitho, Ferh...
135
Voted
NPC
2004
Springer
15 years 8 months ago
Online Mining in Sensor Networks
Online mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. The goal of this position paper ...
Xiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, D...
IPCCC
2005
IEEE
15 years 9 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi
IJSNET
2006
131views more  IJSNET 2006»
15 years 3 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi