Sciweavers

914 search results - page 153 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 2 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
IPSN
2003
Springer
14 years 26 days ago
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
Abstract. We demonstrate that it is possible to achieve accurate localization and tracking of a target in a randomly placed wireless sensor network composed of inexpensive componen...
Radhika Nagpal, Howard E. Shrobe, Jonathan Bachrac...
PERCOM
2007
ACM
14 years 7 months ago
A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition
In this paper we present a toolkit for realizing capacitive sensing applications for human-computer interaction in pervasive computing systems. We argue that capacitive sensors - ...
Raphael Wimmer, Matthias Kranz, Sebastian Boring, ...
EUC
2007
Springer
14 years 1 months ago
Scriptable Sensor Network Based Home-Automation
Today, proprietary home automation targets very specific applications which operate mostly on a cable based infrastructure. In contrast to that, our implementation builds a wirele...
Thomas Haenselmann, Thomas King, Marcel Busse, Wol...
IPSN
2009
Springer
14 years 2 months ago
Application-informed radio duty-cycling in a re-taskable multi-user sensing system
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we c...
Omprakash Gnawali, Jongkeun Na, Ramesh Govindan