Learn More
The supply chain management business can benefit greatly from automation, as recent developments with RFID technology shows. The use of Wireless Sensor Network technology promises to bring the next leap in efficiency and quality of service. However, current WSN system software does not yet provide the required functionality, flexibility and safety. This(More)
In this paper an iterative quality-based algorithm for location discovery is presented which can be used in wireless ad hoc sensor networks. The algorithm will take the reliability of measurements into account and will produce a reliability index for every estimated location using a statistical approach. The algorithm can also work in a hybrid network with(More)
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the distances between the nodes (like the intensity of the received signal strength). The algorithm takes the reliability of measurements into account during calculation of the nodes(More)
Building wireless sensor network applications is a challenging task, and it has become apparent that it is crucial for many sensor networks to be able to load or update the application after deployment. Since communication is a scarce resource and costly in terms of energy, it is important to minimize code size when reprogramming WSNs in the field. This(More)
Wireless sensor networks communication protocols and abstractions have remained fairly simple until now, dealing only with payloads the size of individual network packets. A method to transparently communicate variably sized data in a platform-agnostic manner may ease building energyefficient and robust applications. This paper presents a communication(More)
Wireless sensor and actuator networks consist of a large number of disparate computing devices that together aim to perform a common tasks. Management of large networks may become difficult, when the individual task of each of the devices is different from others, and memory restrictions prevent the devices from all carrying the same network-wide program.(More)
  • 1