Sciweavers

914 search results - page 85 / 183
» Detecting Misused Keys in Wireless Sensor Networks
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
CORR
2010
Springer
163views Education» more  CORR 2010»
13 years 8 months ago
Distributed Principal Component Analysis for Wireless Sensor Networks
Abstract: The Principal Component Analysis (PCA) is a data dimensionality reduction technique well-suited for processing data from sensor networks. It can be applied to tasks like ...
Yann-Aël Le Borgne, Sylvain Raybaud, Gianluca...
WAIM
2007
Springer
14 years 1 months ago
An Adaptive Dynamic Cluster-Based Protocol for Target Tracking in Wireless Sensor Networks
The rapid progress of wireless communication and embedded micro sensing technologies has made wireless sensor networks possible. Target tracking is an important application of wire...
WenCheng Yang, Zhen Fu, Jung-Hwan Kim, Myong-Soon ...
SECON
2008
IEEE
14 years 2 months ago
Cue-Based Networking Using Wireless Sensor Networks: A Video-over-IP Application
—In this paper we present a new approach called cue-based networking that uses hints or cues about the physical environment to optimize networked application behavior. We define...
Yeonsik Jeong, Sriram Lakshmanan, Sandeep Kakumanu...
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 2 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...