Sciweavers

659 search results - page 121 / 132
» Anomaly intrusion detection in wireless sensor networks
Sort
View
TKDE
2008
178views more  TKDE 2008»
13 years 7 months ago
Efficient Similarity Search over Future Stream Time Series
With the advance of hardware and communication technologies, stream time series is gaining ever-increasing attention due to its importance in many applications such as financial da...
Xiang Lian, Lei Chen 0002
CHI
2005
ACM
14 years 7 months ago
Symbolic objects in a networked gestural sound interface
SignalPlay is a sensor-based interactive sound environment in which familiar objects encourage exploration and discovery of sound interfaces through the process of play. Embedded ...
Eric Kabisch, Amanda Williams, Paul Dourish
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
14 years 1 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
EJWCN
2010
237views more  EJWCN 2010»
13 years 2 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang