Sciweavers

332 search results - page 60 / 67
» Identity Aware Sensor Networks
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 1 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
DCOSS
2005
Springer
14 years 27 days ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
DMSN
2007
ACM
13 years 11 months ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...
IPPS
2008
IEEE
14 years 1 months ago
Sweep coverage with mobile sensors
Many efforts have been made for addressing coverage problems in sensor networks. They fall into two categories, full coverage and barrier coverage, featured as static coverage. In...
Wei-Fang Cheng, Mo Li, Kebin Liu, Yunhao Liu, Xian...
MONET
2007
95views more  MONET 2007»
13 years 6 months ago
A Pervasive Computing System for the Operating Room of the Future
We describe a prototype Context Aware Perioperative Information System to capture and interpret data in an operating room of the future. The captured data is used to construct the...
Sheetal K. Agarwal, Anupam Joshi, Timothy W. Finin...