Search For:

Displaying 1-9 out of 9 total
Progressive Data Retrieval for Distributed Networked Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yunghsiang S. Han,Soji Omiwade,Rong Zheng
Issue Date:December 2012
pp. 2303-2314
We propose a decentralized progressive data retrieval (PDR) mechanism for data reconstruction in a network of Byzantine and crash-stop nodes. The scheme progressively retrieves stored data, such that it achieves the minimum communication cost possible. In ...
 
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
Found in: IEEE Transactions on Dependable and Secure Computing
By Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
Issue Date:January 2006
pp. 62-77
To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in w...
 
Broadcast Scheduling in Interference Environment
Found in: IEEE Transactions on Mobile Computing
By Scott C.-H. Huang, Peng-Jun Wan, Jing Deng, Yunghsiang S. Han
Issue Date:November 2008
pp. 1338-1348
Broadcast is a fundamental operation in wireless networks and naive flooding is not practical because it cannot deal with interference. Scheduling is a good way to avoid interference, but previous studies on broadcast scheduling algorithms all assume highl...
 
Trellis-Based Joint Huffman and Convolutional Soft-Decision Priority-First Decoding
Found in: Data Compression Conference
By Yuh-Ming Huang, Yunghsiang S. Han
Issue Date:March 2008
pp. 521
Lakovic et al. presented an algorithm for jointly decoding a Huffman and convolutionally encoded data sequence with significant improvement in error rates relative to a traditional system in which source and channel decoding are performed separately. Howev...
   
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
Found in: IEEE Transactions on Dependable and Secure Computing
By Jing Deng, Yunghsiang S. Han
Issue Date:July 2008
pp. 177-190
In random key pre-distribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and loaded on the sensors prior to deployment. After deployment, each sensor tries to find a common key shar...
 
Adaptive Retransmission for Distributed Detection in Wireless Sensor Networks
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Hung-Ta Pai, Jing-Tian Sung, Yunghsiang S. Han
Issue Date:June 2006
pp. 2-7
An approach combining distributed detection with errorcorrecting codes has recently been proposed to design a fault-tolerant classification system in wireless sensor networks. The detection result of each sensor must be transmitted to a fusion center for m...
 
Power-Efficient Data Fusion Assurance Using Direct Voting Mechanism in Wireless Sensor Networks
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Hung-Ta Pai, Yunghsiang S. Han
Issue Date:June 2006
pp. 368-375
Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, which fuses the collected data before they are sent to the base station, is usually implemented over the network. Since the sensor is typ...
 
A Simple Two-Dimensional Coded Detection Scheme in Wireless Sensor Networks
Found in: Parallel and Distributed Systems, International Conference on
By Hung-Ta Pai, Jing-Tian Sung, Yunghsiang S. Han
Issue Date:July 2005
pp. 383-387
<p>Recently an approach that combined the techniques in distributed classi.cation and the ones in error-correcting codes has been proposed to design a fault-tolerant classi- .cation system in wireless networks. The codeword implemented at the fusion ...
 
A pairwise key predistribution scheme for wireless sensor networks
Found in: ACM Transactions on Information and System Security (TISSEC)
By Aram Khalili, Jing Deng, Jonathan Katz, Pramod K. Varshney, Wenliang Du, Yunghsiang S. Han
Issue Date:May 2005
pp. 228-258
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties....
     
 1