Sciweavers

914 search results - page 61 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
TOSN
2010
63views more  TOSN 2010»
13 years 6 months ago
Fusion of threshold rules for target detection in wireless sensor networks
Mengxia Zhu, Song Ding, Qishi Wu, Richard R. Brook...
EUROSSC
2007
Springer
14 years 2 months ago
Recognition of User Activity Sequences Using Distributed Event Detection
We describe and evaluate a distributed architecture for the online recognition of user activity sequences. In a lower layer, simple heterogeneous atomic activities were recognised ...
Oliver Amft, Clemens Lombriser, Thomas Stiefmeier,...
IDEAS
2006
IEEE
180views Database» more  IDEAS 2006»
14 years 1 months ago
SURCH: Distributed Aggregation over Wireless Sensor Networks
In this paper, we present SURCH, a novel decentralized algorithm for efficient processing of queries generated in sensor networks. Unlike existing techniques, SURCH is fully dist...
Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubraman...
TMC
2012
11 years 10 months ago
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
—This article1 presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the...
Scott Pudlewski, Arvind Prasanna, Tommaso Melodia
ESAS
2005
Springer
14 years 1 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...