Sciweavers

336 search results - page 45 / 68
» Monitoring modulo theories
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
TON
2012
12 years 10 days ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
ADHOCNETS
2009
Springer
14 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
SIGMETRICS
2009
ACM
140views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Maximum likelihood estimation of the flow size distribution tail index from sampled packet data
In the context of network traffic analysis, we address the problem of estimating the tail index of flow (or more generally of any group) size distribution from the observation of...
Patrick Loiseau, Paulo Gonçalves, Sté...
IPPS
2007
IEEE
14 years 4 months ago
Distributed, Reliable Restoration Techniques using Wireless Sensor Devices
Wireless sensor networks are small, inexpensive and flexible computational platforms, that have found popular applications in various areas including environmental monitoring, he...
Yannis Drougas, Vana Kalogeraki