Sciweavers

2705 search results - page 27 / 541
» Splitting the sensor node
Sort
View
117
Voted
ICNP
2009
IEEE
14 years 7 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
144
Voted
ICDE
2004
IEEE
100views Database» more  ICDE 2004»
15 years 11 months ago
Simple, Robust and Highly Concurrent B-trees with Node Deletion
Why might B-tree concurrency control still be interesting? For two reasons: (i) currently exploited "real world" approaches are complicated; (ii) simpler proposals are n...
David B. Lomet
DAC
1996
ACM
15 years 1 months ago
Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction
In this paper, we describe how we have improved the efficiency of a finite-element method for interconnect resistance extraction by introducingarticulation nodes in the finiteelem...
Arjan J. van Genderen, N. P. van der Meijs
CDC
2010
IEEE
115views Control Systems» more  CDC 2010»
14 years 4 months ago
Distributed statistical estimation of the number of nodes in sensor networks
The distributed estimation of the number of active sensors in a network can be important for estimation and organization purposes. We propose a design methodology based on the foll...
Damiano Varagnolo, Gianluigi Pillonetto, Luca Sche...
NETWORKING
2007
14 years 11 months ago
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
Abstract. Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, they are either vulnerable to a few number of compromised sensor ...
Qi Dong, Donggang Liu