Sciweavers

602 search results - page 95 / 121
» Decentralized intrusion detection in wireless sensor network...
Sort
View
TKDE
2008
134views more  TKDE 2008»
13 years 7 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
IWCMC
2010
ACM
14 years 24 days ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
An Event-Detection Estimation Model for Hybrid Adaptive Routing in WSNs
— A fundamental goal of a wireless sensor network (WSN) is to collect and deliver data to external applications. Due to the strong constraints of these networks, routing algorith...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
ADHOCNOW
2009
Springer
13 years 8 months ago
On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment
We consider n mobile sensors located on a line containing a barrier represented by a finite line segment. Sensors form a wireless sensor network and are able to move within the lin...
Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc...
ICC
2011
IEEE
257views Communications» more  ICC 2011»
12 years 7 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...