Sciweavers

386 search results - page 39 / 78
» Learning Network Topology from Simple Sensor Data
Sort
View
AINA
2010
IEEE
13 years 12 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
DIMVA
2007
13 years 10 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
ADHOCNOW
2007
Springer
14 years 2 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
IJSNET
2007
169views more  IJSNET 2007»
13 years 8 months ago
ART: an asymmetric and reliable transport mechanism for wireless sensor networks
: Many applications developed for wireless sensor networks (WSNs) demand for Reliable communication service, since majority of these applications are event-critical applications. T...
Nurcan Tezcan, Wenye Wang
ICDCS
2009
IEEE
14 years 5 months ago
CLIQUE: Role-Free Clustering with Q-Learning for Wireless Sensor Networks
Clustering and aggregation inherently increase wireless sensor network (WSN) lifetime by collecting information within a cluster at a cluster head, reducing the amount of data thr...
Anna Förster, Amy L. Murphy