Sciweavers

298 search results - page 38 / 60
» A key pre-distribution scheme using deployment knowledge for...
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
ICDE
2007
IEEE
138views Database» more  ICDE 2007»
14 years 8 months ago
ICEDB: Intermittently-Connected Continuous Query Processing
Current distributed database and stream processing systems assume that the network connecting nodes in the data processor is "always on," and that the absence of a netwo...
Yang Zhang, Bret Hull, Hari Balakrishnan, Samuel M...
MOBISYS
2009
ACM
14 years 8 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
IPSN
2011
Springer
12 years 10 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 1 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...