Sciweavers

5813 search results - page 184 / 1163
» Sensor Networks
Sort
View
MOBIHOC
2007
ACM
16 years 3 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
GIS
2008
ACM
16 years 4 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
ICC
2011
IEEE
239views Communications» more  ICC 2011»
14 years 3 months ago
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors
—Location information of nodes is the basis for many applications in wireless sensor networks (WSNs). However, most previous localization methods make the unrealistic assumption:...
Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei ...
IPSN
2007
Springer
15 years 10 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
JNW
2007
90views more  JNW 2007»
15 years 3 months ago
A Traveling Wave based Communication Mechanism for Wireless Sensor Networks
Abstract— In this paper, we propose and evaluate a selforganizing communication mechanism for wireless sensor networks where a large number of sensor nodes are deployed. To accom...
Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murat...