Sciweavers

710 search results - page 123 / 142
» Composite Event Detection in Wireless Sensor Networks
Sort
View
166
Voted
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
139
Voted
PERCOM
2007
ACM
15 years 10 months ago
Sensor Web Design Studies for Realtime Dynamic Congestion Pricing
Traffic Congestion is a multi-billion dollar national problem and worsening every year with population growth and increase in freight traffic. We present a model for realistic s...
Milton Halem, Anand Patwardhan, Sandor Dornbush, M...
134
Voted
AAAI
2006
15 years 5 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...
156
Voted
ISCC
2007
IEEE
164views Communications» more  ISCC 2007»
15 years 10 months ago
DTSN: Distributed Transport for Sensor Networks
: This paper presents the Distributed Transport for Sensor Networks (DTSN), a novel reliable transport protocol for convergecast and unicast communications in Wireless Sensor Netwo...
Bruno Marchi, António Grilo, Mário S...
133
Voted
PERCOM
2006
ACM
16 years 3 months ago
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
Key predistribution schemes are a favoured solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback ...
Tyler Moore