Sciweavers

895 search results - page 160 / 179
» Outlier detection in sensor networks
Sort
View
EJWCN
2010
237views more  EJWCN 2010»
13 years 2 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
FTDB
2011
98views more  FTDB 2011»
12 years 11 months ago
Secure Distributed Data Aggregation
We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithm...
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn S...
ICAT
2006
IEEE
14 years 1 months ago
Fault Diagnosis System for Turbo-Generator Set Based on Fuzzy Neural Network
When a fault such as unbalance occurs in a turbo-generator set, sensors should be put on its bearing to detect vibration signals for extracting fault symptoms, but the relationshi...
Ping Yang, Qing-miao Wang
MOBISYS
2009
ACM
14 years 8 months ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
PERCOM
2005
ACM
14 years 7 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon