Sciweavers

815 search results - page 144 / 163
» Deployment algorithms for a power-constrained mobile sensor ...
Sort
View
RAID
2009
Springer
14 years 3 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
13 years 10 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
CISS
2008
IEEE
14 years 3 months ago
A distributed scheme for detection of information flows
—Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in th...
Ameya Agaskar, Lang Tong, Ting He
AAAI
2011
12 years 8 months ago
Global Seismic Monitoring: A Bayesian Approach
The automated processing of multiple seismic signals to detect and localize seismic events is a central tool in both geophysics and nuclear treaty verification. This paper report...
Nimar S. Arora, Stuart Russell, Paul Kidwell, Erik...
IPSN
2007
Springer
14 years 2 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...