Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
11927
search results - page 168 / 2386
»
Wireless Sensor Networks
Sort
relevance
views
votes
recent
update
View
thumb
title
99
click to vote
MOBIHOC
2005
ACM
101
views
Computer Networks
»
more
MOBIHOC 2005
»
Minimum power configuration in wireless sensor networks
16 years 2 months ago
Download
www.cse.wustl.edu
Guoliang Xing, Chenyang Lu, Ying Zhang, Qingfeng H...
claim paper
Read More »
95
click to vote
EWSN
2006
Springer
143
views
Computer Networks
»
more
EWSN 2006
»
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks
16 years 2 months ago
Download
seclab.inha.ac.kr
Abedelaziz Mohaisen, DaeHun Nyang
claim paper
Read More »
126
click to vote
MOBIHOC
2007
ACM
145
views
Computer Networks
»
more
MOBIHOC 2007
»
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
16 years 2 months ago
Download
www.dsi.uniroma1.it
Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, ...
claim paper
Read More »
98
click to vote
MOBIHOC
2004
ACM
111
views
Computer Networks
»
more
MOBIHOC 2004
»
Latency of wireless sensor networks with uncoordinated power saving mechanisms
16 years 2 months ago
Download
lion.cs.uiuc.edu
Olivier Dousse, Petteri Mannersalo, Patrick Thiran
claim paper
Read More »
126
click to vote
ICDCS
2008
IEEE
235
views
Distributed And Parallel Com...
»
more
ICDCS 2008
»
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
15 years 9 months ago
Download
www.seas.gwu.edu
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
claim paper
Read More »
« Prev
« First
page 168 / 2386
Last »
Next »