Sciweavers

5234 search results - page 694 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJAHUC
2006
128views more  IJAHUC 2006»
15 years 5 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
JNSM
2008
73views more  JNSM 2008»
15 years 5 months ago
Probe Station Placement for Robust Monitoring of Networks
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...
Maitreya Natu, Adarshpal S. Sethi
TC
2008
15 years 5 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
JPDC
2007
191views more  JPDC 2007»
15 years 5 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
AROBOTS
2002
113views more  AROBOTS 2002»
15 years 5 months ago
An Incremental Self-Deployment Algorithm for Mobile Sensor Networks
This paper describes an incremental deployment algorithm for mobile sensor networks. A mobile sensor network is a distributed collection of nodes, each of which has sensing, compu...
Andrew Howard, Maja J. Mataric, Gaurav S. Sukhatme