Sciweavers

914 search results - page 150 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
AAAI
2006
13 years 9 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...
AUTONOMICS
2007
ACM
13 years 11 months ago
Facet: towards a smart camera network of mobile phones
Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensor...
Philipp Bolliger, Moritz Köhler, Kay Röm...
ISCC
2007
IEEE
164views Communications» more  ISCC 2007»
14 years 1 months ago
DTSN: Distributed Transport for Sensor Networks
: This paper presents the Distributed Transport for Sensor Networks (DTSN), a novel reliable transport protocol for convergecast and unicast communications in Wireless Sensor Netwo...
Bruno Marchi, António Grilo, Mário S...
DCC
2009
IEEE
14 years 8 months ago
Optimization of Correlated Source Coding for Event-Based Monitoring in Sensor Networks
Motivated by the paradigm of event-based monitoring, which can potentially alleviate the inherent bandwidth and energy constraints associated with wireless sensor networks, we con...
Jaspreet Singh, Ankur Saxena, Kenneth Rose, Upaman...
JCM
2008
77views more  JCM 2008»
13 years 7 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...