Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...
— We consider the design of a sensor network for detecting an emitter who if present is known to be located in an interval but whose exact position is unknown. We seek to minimiz...
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
—In this paper, the problem of deploying relay nodes in wireless sensor networks will be considered. A system consisting of a set of sensor nodes communicating to a fusion center...
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...