Sciweavers

1557 search results - page 307 / 312
» Security and Cooperation in Wireless Networks
Sort
View
SIGKDD
2008
149views more  SIGKDD 2008»
13 years 7 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
IJSNET
2010
122views more  IJSNET 2010»
13 years 6 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
CHI
2010
ACM
14 years 2 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
14 years 24 days ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 1 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood