Sciweavers

858 search results - page 65 / 172
» User Authentication in Sensor Networks
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 10 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
ACSAC
2007
IEEE
15 years 4 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
GIS
2008
ACM
15 years 11 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
INFOCOM
2006
IEEE
15 years 4 months ago
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions
— We address the problem of energy efficient sensing by adaptively coordinating the sleep schedules of sensor nodes while guaranteeing that values of sleeping nodes can be recov...
Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
DATE
2004
IEEE
144views Hardware» more  DATE 2004»
15 years 1 months ago
A Framework for Battery-Aware Sensor Management
A distributed sensor network (DSN) designed to cover a given region R, is said to be alive if there is at least one subset of sensors that can collectively cover (sense) the regio...
Sridhar Dasika, Sarma B. K. Vrudhula, Kaviraj Chop...