Learn More
In recent years, design of wireless sensor networks using methodologies and mechanisms from other disciplines has gained popularity for addressing many networking aspects and providing more flexible and robust algorithms. We address in this paper the problem of random walk to model routing for data gathering in wireless sensor networks. While at first(More)
Les réseaux de capteurs sans fils sont constitués d'un grand nombre de noeuds assujettisà de sévères contraintes en terme d'´ energie, de capacité de traitement et de communication. Dans ce contexte, afin de réduire la complexité, un des défis majeurs rencontrés dans ce type de réseau est le calcul des routes et la mise en oeuvre de schémas de routage(More)
Wireless environment monitoring applications with significantly relaxed quality-of-service constraints are emerging. Hence, the possibility to use rough low knowledge routing in sensor networks to reduce hardware resource and software complexity is questionable. Moreover, low knowledge handling allows better genericity, which is of interest, for instance,(More)
—Over the last decade, design of wireless sensor networks using methodologies and mechanisms from other disciplines has gained popularity for addressing many networking aspects and providing more flexible and robust algorithms. Among these mechanisms, random walk techniques have attracted considerable interest in numerous research efforts. The popularity of(More)
In the last few years, there has been an increasing concern about stochastic properties of contact-based metrics under general mobility models in delay-tolerant networks. Such a concern will provide a first step toward detailed performance analysis of various routing/forwarding algorithms and shed light on better design of network protocols under realistic(More)
—The network virus propagation is influenced by various factors, and some of them are neglected in most of the existed models in the literature. In this paper, we study the network virus propagation based on the the epidemiological viewpoint. We assume that nodes can be equipped with protection against virus and the security of a node depends not only on(More)