Sciweavers

914 search results - page 142 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
14 years 1 months ago
A novel generative encoding for exploiting neural network sensor and output geometry
A significant problem for evolving artificial neural networks is that the physical arrangement of sensors and effectors is invisible to the evolutionary algorithm. For example,...
David B. D'Ambrosio, Kenneth O. Stanley
DSN
2005
IEEE
14 years 1 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
SENSYS
2006
ACM
14 years 1 months ago
The design and implementation of a self-calibrating distributed acoustic sensing platform
We present the design, implementation, and evaluation of the Acoustic Embedded Networked Sensing Box (ENSBox), a platform for prototyping rapid-deployable distributed acoustic sen...
Lewis Girod, Martin Lukac, Vlad Trifa, Deborah Est...
CISS
2007
IEEE
14 years 2 months ago
Collector Receiver Design for Data Collection and Localization in Sensor-driven Networks
— We consider a sensor network in which the sensors communicate at will when they have something to report, without prior coordination with other sensors or with data collection ...
Bharath Ananthasubramaniam, Upamanyu Madhow
COMSWARE
2007
IEEE
14 years 2 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...