Sanitary Motes and Beams

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Of malicious motes and suspicious sensors

How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β—unknown to the honest players. We show that communication can be delayed for 2β + Θ(lg |V |) rounds,...

متن کامل

Watchdog Designs for TinyOS Motes

We investigate a way to increase the reliability of distributed wireless networks by introducing two watchdog designs on the Mica mote. These watchdogs detect errors through monitoring aspects of the system and then take steps so that the mote recovers from these errors. The first design is a coprocessor watchdog that monitors the functionality of the main processor through heartbeat signals. T...

متن کامل

MICA: The Commercialization of Microsensor Motes

New technology is changing the nature of sensors and the way they interface with data acquisition and control systems. Researchers at U.C. Berkeley have developed an open-source hardware and software platform that combines sensing, communications, and computing into a complete architecture. The first commercial generation of this platform was dubbed the Rene Mote, and several thousand of these ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientific American

سال: 1893

ISSN: 0036-8733

DOI: 10.1038/scientificamerican12021893-14948supp