Sciweavers

343 search results - page 23 / 69
» Performance Limits of Fair-Access in Underwater Sensor Netwo...
Sort
View
RTSS
2008
IEEE
14 years 2 months ago
Fast Sensor Placement Algorithms for Fusion-Based Target Detection
Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fus...
Zhaohui Yuan, Rui Tan, Guoliang Xing, Chenyang Lu,...
CF
2005
ACM
13 years 9 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
ICASSP
2009
IEEE
14 years 2 months ago
Decentralized variational filtering for simultaneous sensor localization and target tracking in binary sensor networks
Resource limitations in wireless sensor networks have put stringent constraints on distributed signal processing. In this paper, we propose a cluster-based decentralized variation...
Jing Teng, Hichem Snoussi, Cédric Richard
EWSN
2006
Springer
14 years 7 months ago
A Measurement-Based Analysis of the Interaction Between Network Layers in TinyOS
There have been a number of recent proposals for link and network-layer protocols in the sensor networking literature, each of which claims to be superior to other approaches. Howe...
Umberto Malesci, Samuel Madden
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu