Sciweavers

306 search results - page 32 / 62
» Advanced Evasive Data Storage in Sensor Networks
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
IPSN
2004
Springer
14 years 29 days ago
Adaptive clock synchronization in sensor networks
Recent advances in technology have made low cost, low power wireless sensors a reality. Clock synchronization is an important service in any distributed system, including sensor n...
Santashil PalChaudhuri, Amit Kumar Saha, David B. ...
BSN
2009
IEEE
330views Sensor Networks» more  BSN 2009»
13 years 11 months ago
Speckled Tango Dancers: Real-Time Motion Capture of Two-Body Interactions Using On-body Wireless Sensor Networks
: This project investigates the application of a fully wireless network of inertial sensors for full-body, 3-D motion capture, for the real-time analysis of Tango dancing. Towards ...
D. K. Arvind, Aris Valtazanos
MOBIHOC
2009
ACM
14 years 8 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 9 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...