Sciweavers

895 search results - page 150 / 179
» Outlier detection in sensor networks
Sort
View
SASO
2007
IEEE
14 years 2 months ago
Desynchronization: The Theory of Self-Organizing Algorithms for Round-Robin Scheduling
The study of synchronization has received much attention in a variety of applications, ranging from coordinating sensors in wireless networks to models of fireflies flashing in...
Ankit Patel, Julius Degesys, Radhika Nagpal
SAINT
2008
IEEE
14 years 2 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal
PETRA
2009
ACM
14 years 2 months ago
Identifying people in camera networks using wearable accelerometers
We propose a system to identify people in a sensor network. The system fuses motion information measured from wearable accelerometer nodes with motion traces of each person detect...
Thiago Teixeira, Deokwoo Jung, Gershon Dublon, And...
INFOCOM
2011
IEEE
12 years 11 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
AAMAS
2006
Springer
13 years 8 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara