The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over years, many efforts are made for the problem of constructing fault-tolerant virtual backbones in wireless network. In case that the wireless network consists of physically equivalent nodes, e.g. with the same communication range, unit disk graph model is universally used to abstract the wireless network and the problem is defined as the $k$-connected $m$- dominating set problem on the unit disk...
In a wireless sensor network, a subset of sensor nodes provides a barrier-coverage over an area of interest if the sensor nodes are dividing the area into two regions such that any object moving from one region to another is guaranteed to be detected by a sensor node. Recently, Kumar et al. introduced scheduling algorithms for the maximum lifetime barrier-coverage problem. The algorithms achieved...
The recent technological advances in mobile devices such as smartphones foster a wide variety of emerging applications which consider users as the providers as well as consumers of the highly valuable real world data from the devices. Interestingly enough, many of the existing researches related to this topic implicitly assume that the users will actively provide mobile sensing data to enable the...
The Internet is often referred to as an information highway since it offers a great mean for the general public to access the almost unlimited amount of information. At the same time, this communication technology poses a great threat to the system in those countries that wish to control the information flow. As a result, the Internet is subject to be under censorship, which is, however, a great privacy...
This paper identifies a new security problem of existing scheduling algorithms for barrier-coverage of sensors, which never considered before. A barrier-cover of wireless sensors is a subset of sensors seamlessly spanning between two opposite sides such that no intruder can move from one side to the other without being detected. The goal of the scheduling algorithms is to find a sleep-wakeup schedule...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.