Sciweavers

914 search results - page 48 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
HUC
2009
Springer
14 years 17 days ago
A Survey on Localization for Mobile Wireless Sensor Networks
Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspe...
Isaac Amundson, Xenofon D. Koutsoukos
DMSN
2010
ACM
13 years 9 months ago
PAO: power-efficient attribution of outliers in wireless sensor networks
Sensor nodes constitute inexpensive, disposable devices that are often scattered in harsh environments of interest so as to collect and communicate desired measurements of monitor...
Nikos Giatrakos, Yannis Kotidis, Antonios Deligian...
ADHOCNETS
2009
Springer
14 years 2 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
TSP
2008
150views more  TSP 2008»
13 years 7 months ago
Local Vote Decision Fusion for Target Detection in Wireless Sensor Networks
This study examines the problem of target detection by a wireless sensor network. Sensors acquire measurements emitted from the target that are corrupted by noise and initially ma...
Natallia Katenka, Elizaveta Levina, George Michail...
CN
2006
191views more  CN 2006»
13 years 8 months ago
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Most fault-tolerant schemes for wireless sensor networks focus on power failures or crash faults. Little attention has been paid to the data inconsistency failures which occur whe...
Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Ji...