Sciweavers

1125 search results - page 161 / 225
» The Coverage Problem in Three-Dimensional Wireless Sensor Ne...
Sort
View
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
119
Voted
COMCOM
2006
79views more  COMCOM 2006»
15 years 3 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
119
Voted
IPPS
2006
IEEE
15 years 9 months ago
Solving generic role assignment exactly
role assignment is a programming abstraction that supports the assignment of user-defined roles to sensor nodes such that certain conditions are met. Many common network configu...
Christian Frank, Kay Römer
PERCOM
2009
ACM
15 years 10 months ago
HIPS: A Calibration-less Hybrid Indoor Positioning System Using Heterogeneous Sensors
—Positioning is a crucial task in pervasive computing, aimed at estimating the user’s positions to provide location-based services. In this paper, we study an interesting probl...
Vincent Wenchen Zheng, Junhui Zhao, Yongcai Wang, ...
117
Voted
CEC
2010
IEEE
15 years 3 months ago
Multi-objective mobile agent-based Sensor Network Routing using MOEA/D
Abstract— Mobile agents are often used in wireless sensor networks for distributed target detection with the goal of minimizing the transmission of non-critical data that negativ...
Andreas Konstantinidis 0002, Christoforos Charalam...