Sciweavers

173 search results - page 32 / 35
» Detecting selective forwarding attacks in wireless sensor ne...
Sort
View
130
Voted
APSCC
2008
IEEE
15 years 10 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
139
Voted
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 10 months ago
ISROBOTNET: A testbed for sensor and robot network systems
— This paper introduces a testbed for sensor and robot network systems, currently composed of 10 cameras and 5 mobile wheeled robots equipped with several sensors for self-locali...
Marco Barbosa, Alexandre Bernardino, Dario Figueir...
160
Voted
IPPS
2010
IEEE
15 years 1 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
120
Voted
MOBIHOC
2002
ACM
16 years 3 months ago
Performance analysis of the CONFIDANT protocol
: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate...
Sonja Buchegger, Jean-Yves Le Boudec
142
Voted
SASN
2004
ACM
15 years 9 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson