Sciweavers

209 search results - page 14 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 3 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
DSN
2000
IEEE
14 years 1 months ago
Executable Assertions for Detecting Data Errors in Embedded Control Systems
In order to be able to tolerate the effects of faults, we must first detect the symptoms of faults, i.e. the errors. This paper evaluates the error detection properties of an erro...
Martin Hiller
SIGCOMM
2010
ACM
13 years 9 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...
SIGMOD
2007
ACM
168views Database» more  SIGMOD 2007»
14 years 9 months ago
In-network execution of monitoring queries in sensor networks
Sensor networks are widely used in many applications for collecting information from the physical environment. In these applications, it is usually necessary to track the relation...
Xiaoyan Yang, Hock-Beng Lim, M. Tamer Özsu, K...
MOBICOM
2004
ACM
14 years 2 months ago
Analyzing the spread of active worms over VANET
Interactive communications among nodes in Vehicular Ad Hoc Networks (VANET) and the safety-oriented nature of many VANET applications necessitate a robust security framework. An a...
Syed A. Khayam, Hayder Radha