Sciweavers

1804 search results - page 339 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
RTSS
2003
IEEE
14 years 2 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
DCOSS
2006
Springer
14 years 13 days ago
The Virtual Pheromone Communication Primitive
We propose a generic communication primitive designed for sensor networks. Our primitive hides details of network communication while retaining sufficient programmer control over t...
Leo Szumel, John D. Owens
ISER
2000
Springer
112views Robotics» more  ISER 2000»
14 years 10 days ago
Simulation and Experimental Evaluation of Complete Sensor-Based Coverage in Rectilinear Environments
: Although sensor-based coverage is a skill which is applicable to a variety of robot tasks, its implementation has so far been limited, mostly by the physical limitations of tradi...
Zack J. Butler, Alfred A. Rizzi, Ralph L. Hollis
IAJIT
2007
150views more  IAJIT 2007»
13 years 8 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
HCI
2009
13 years 6 months ago
Supporting Situation Awareness in Demanding Operating Environments through Wearable User Interfaces
The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
Jari Laarni, Juhani Heinilä, Jukka Häkki...