Sciweavers

3486 search results - page 135 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
JPDC
2006
187views more  JPDC 2006»
14 years 10 months ago
On constructing k-connected k-dominating set in wireless ad hoc and sensor networks
An important problem in wireless ad hoc and sensor networks is to select a few nodes to form a virtual backbone that supports routing and other tasks such as area monitoring. Prev...
Fei Dai, Jie Wu
IPPS
2005
IEEE
15 years 3 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu
DCOSS
2010
Springer
15 years 2 months ago
Time-Critical Data Delivery in Wireless Sensor Networks
A number of wireless sensor network (WSN) applications demand timely data delivery. However, existing WSNs are designed to conserve energy and not to support timely data transmissi...
Petcharat Suriyachai, James Brown, Utz Roedig
FUZZIEEE
2007
IEEE
15 years 4 months ago
Applying Fuzzy Logic for Decision-making on Wireless Sensor Networks
— We propose a fuzzy-based decision-making mechanism for selecting data dissemination protocols in wireless sensor networks (WSNs). Its goal is to select the most efficient proto...
Luci Pirmez, Flávia Coimbra Delicato, Paulo...
JUCS
2008
113views more  JUCS 2008»
14 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella