Sciweavers

511 search results - page 90 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
ICCV
2003
IEEE
14 years 9 months ago
Counting People in Crowds with a Real-Time Network of Simple Image Sensors
Estimating the number of people in a crowded environment is a central task in civilian surveillance. Most vision-based counting techniques depend on detecting individuals in order...
Danny B. Yang, Héctor H. González-Ba...
ADHOCNOW
2007
Springer
14 years 1 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
MOBIHOC
2010
ACM
13 years 5 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
USENIX
2003
13 years 9 months ago
In-Place Rsync: File Synchronization for Mobile and Wireless Devices
The open-source rsync utility reduces the time and bandwidth required to update a file across a network. Rsync uses an interactive protocol that detects changes in a file and se...
David Rasch, Randal C. Burns
TWC
2011
301views more  TWC 2011»
13 years 2 months ago
Performance Evaluation of a MIMO-Assisted MPR-MAC over Lossy Channels
Abstract—Coping with collisions is one of the biggest challenges in the design of MAC algorithms for wireless networks. Recent advances in MIMO communications have provided the p...
Sanaz Barghi, Hamid Jafarkhani, Homayoun Yousefi'z...