Sciweavers

802 search results - page 159 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
LOCA
2007
Springer
14 years 1 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
14 years 2 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
MOBISYS
2010
ACM
13 years 10 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 4 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...