Sciweavers

858 search results - page 103 / 172
» User Authentication in Sensor Networks
Sort
View
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
15 years 10 months ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
PDP
2009
IEEE
15 years 4 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
ICDCS
2005
IEEE
15 years 3 months ago
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications
Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new midd...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
SECON
2007
IEEE
15 years 4 months ago
Decentralized Multiuser Diversity with Cooperative Relaying in Wireless Sensor Networks
— Multiuser diversity is a phenomenon caused by channel variations among different users in a wireless network. Cooperative relaying provides another form of diversity due to the...
Sam Vakil, Ben Liang
ICC
2007
IEEE
145views Communications» more  ICC 2007»
15 years 4 months ago
Distributed Optimization for Utility-Energy Tradeoff in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) are energyconstrained in nature, in this paper, we formulate the problem of data transport in sensor networks as a network utility maxim...
Shengbin Liao, Wenqing Cheng, Wei Liu, Zongkai Yan...