Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root cause...
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...