Sciweavers

266 search results - page 45 / 54
» Reservation-based protocol for monitoring applications using...
Sort
View
P2P
2003
IEEE
205views Communications» more  P2P 2003»
14 years 19 days ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
ICNP
2009
IEEE
14 years 2 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
14 years 29 days ago
Hand Force Estimation using Electromyography Signals
— In many studies and applications that include direct human involvement such as human-robot interaction, control of prosthetic arms, and human factor studies, hand force is need...
Farid Mobasser, Keyvan Hashtrudi-Zaad
SUTC
2010
IEEE
13 years 11 months ago
Adaptive Activity Spotting Based on Event Rates
—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Oliver Amft