Sciweavers

914 search results - page 140 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
BSN
2006
IEEE
157views Sensor Networks» more  BSN 2006»
14 years 1 months ago
HealthGear: A Real-time Wearable System for Monitoring and Analyzing Physiological Signals
We present HealthGear, a real-time wearable system for monitoring, visualizing and analyzing physiological signals. HealthGear consists of a set of non-invasive physiological sens...
Nuria Oliver, Fernando Flores-Mangas
SASN
2006
ACM
14 years 1 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ICDCS
2008
IEEE
14 years 2 months ago
Data Estimation in Sensor Networks Using Physical and Statistical Methodologies
Wireless Sensor Networks (WSNs) are employed in many applications in order to collect data. One key challenge is to minimize energy consumption to prolong network lifetime. A sche...
Yingshu Li, Chunyu Ai, Wiwek P. Deshmukh, Yiwei Wu
ACMACE
2009
ACM
13 years 8 months ago
Developing multiplayer pervasive games and networked interactive installations using ad hoc mobile sensor nets
We here present Fun in Numbers (FinN), a framework for developing pervasive applications and interactive installations for entertainment and educational purposes. Using ad hoc mob...
Orestis Akribopoulos, Marios Logaras, Nikos Vasila...
AI
2007
Springer
14 years 1 months ago
Learning Network Topology from Simple Sensor Data
In this paper, we present an approach for recovering a topological map of the environment using only detection events from a deployed sensor network. Unlike other solutions to this...
Dimitri Marinakis, Philippe Giguère, Gregor...