Sciweavers

815 search results - page 89 / 163
» Deployment algorithms for a power-constrained mobile sensor ...
Sort
View
JNSM
2008
93views more  JNSM 2008»
13 years 8 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
FGCN
2008
IEEE
170views Communications» more  FGCN 2008»
14 years 3 months ago
NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks
Simulators are needed for testing algorithms of wireless sensor networks (WSNs) for large scale scenarios. Deploying real WSN testbed provides a more realistic testing environment...
Lei Shu, Chun Wu, Yan Zhang, Jiming Chen, Lei Wang...
INFOCOM
2009
IEEE
14 years 3 months ago
Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access
—Vehicular Internet access via open WLAN access points (APs) has been demonstrated to be a feasible solution to provide opportunistic data service to moving vehicles. Using an in...
Zizhan Zheng, Prasun Sinha, Santosh Kumar
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
14 years 3 months ago
Decentralized cooperative collision avoidance for acceleration constrained vehicles
— Safety must be ensured in the deployment of multi-agent vehicle systems. This paper presents decentralized collision avoidance algorithms for systems with second order dynamics...
Gabriel Hoffmann, Claire J. Tomlin
TMC
2012
11 years 11 months ago
Fast Data Collection in Tree-Based Wireless Sensor Networks
—We investigate the following fundamental question—how fast can information be collected from a wireless sensor network organized as tree? To address this, we explore and evalu...
Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar K...