Sciweavers

895 search results - page 17 / 179
» Outlier detection in sensor networks
Sort
View
SERSCISA
2009
Springer
14 years 2 months ago
A Deployment Value Model for Intrusion Detection Sensors
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different typ...
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Jo...
ICNP
2003
IEEE
14 years 1 months ago
A Bidding Protocol for Deploying Mobile Sensors
In some harsh environments, manually deploying sensors is impossible. Alternative methods may lead to imprecise placement resulting in coverage holes. To provide the required high...
Guiling Wang, Guohong Cao, Thomas F. La Porta
TMC
2008
109views more  TMC 2008»
13 years 8 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
ICRA
2005
IEEE
156views Robotics» more  ICRA 2005»
14 years 1 months ago
A Hierarchical Multiple-Target Tracking Algorithm for Sensor Networks
Abstract— Multiple-target tracking is a canonical application of sensor networks as it exhibits different aspects of sensor networks such as event detection, sensor information f...
Songhwai Oh, Luca Schenato, Shankar Sastry
IPSN
2005
Springer
14 years 1 months ago
Lifetime-aware intrusion detection under safeguarding constraints
: This paper addresses the problem of maximizing the service lifetime of a distributed battery-powered sensor network in the context of the network interdiction problem under user-...
Ali Iranli, Hanif Fatemi, Massoud Pedram