Sciweavers

292 search results - page 47 / 59
» A ring-processor based blind beamformer design for use in wi...
Sort
View
IJSNET
2010
122views more  IJSNET 2010»
13 years 6 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
SENSYS
2010
ACM
13 years 6 months ago
Meeting ecologists' requirements with adaptive data acquisition
Ecologists instrument ecosystems to collect time series representing the evolution in time and space of relevant abiotic and biotic factors. Sensor networks promise to improve on ...
Marcus Chang, Philippe Bonnet
CASES
2006
ACM
14 years 2 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
SENSYS
2010
ACM
13 years 6 months ago
PipeProbe: a mobile sensor droplet for mapping hidden pipeline
This paper presents PipeProbe, a mobile sensor system for determining the spatial topology of hidden water pipelines behind walls. PipeProbe works by dropping a tiny wireless sens...
Tsung-Te Lai, Yu-Han Chen, Polly Huang, Hao-Hua Ch...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 2 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...