Sciweavers

2282 search results - page 453 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICUMT
2009
13 years 5 months ago
On the adaptivity of today's Energy-Efficient MAC protocols under varying traffic conditions
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major por...
Philipp Hurni, Torsten Braun
ICDCSW
2007
IEEE
14 years 1 months ago
A Context-aware Reminding System for Daily Activities of Dementia Patients
Older people with dementia often decline in short-term memory and forget what to do next to complete their activities of daily living (ADLs), such as tea-making and toothbrushing....
Hua Si, Seung Jin Kim, Nao Kawanishi, Hiroyuki Mor...
TWC
2010
13 years 2 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
LOCA
2007
Springer
14 years 1 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
14 years 1 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar