Sciweavers

394 search results - page 61 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
DSN
2009
IEEE
14 years 3 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman
PERCOM
2005
ACM
14 years 8 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
RTSS
2009
IEEE
14 years 3 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
CVPR
2007
IEEE
14 years 2 months ago
Surveillance in Virtual Reality: System Design and Multi-Camera Control
This paper advocates a Virtual Vision paradigm and demonstrates its usefulness in camera sensor network research. Virtual vision prescribes the use of a visually and behaviorally ...
Faisal Qureshi, Demetri Terzopoulos
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...