Sciweavers

858 search results - page 66 / 172
» User Authentication in Sensor Networks
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ISCC
2006
IEEE
188views Communications» more  ISCC 2006»
15 years 4 months ago
Active Learning Driven Data Acquisition for Sensor Networks
Online monitoring of a physical phenomenon over a geographical area is a popular application of sensor networks. Networks representative of this class of applications are typicall...
Anish Muttreja, Anand Raghunathan, Srivaths Ravi, ...
EWSN
2004
Springer
15 years 9 months ago
Prototyping Wireless Sensor Network Applications with BTnodes
We present a hardware and software platform for rapid prototyping of augmented sensor network systems, which may be temporarily connected to a backend infrastructure for data stora...
Frank Siegemund, Friedemann Mattern, Jan Beutel, K...
CSE
2009
IEEE
15 years 4 months ago
Autonomous Management and Control of Sensor Network-Based Applications
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...
FSR
2003
Springer
251views Robotics» more  FSR 2003»
15 years 3 months ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...