Sciweavers

1266 search results - page 57 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
153
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
TC
2010
15 years 2 months ago
The Design and Evaluation of a Self-Organizing Superpeer Network
—Superpeer architectures exploit the heterogeneity of nodes in a peer-to-peer (P2P) network by assigning additional responsibilities to higher capacity nodes. In the design of a ...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
DCOSS
2008
Springer
15 years 5 months ago
Distributed Activity Recognition with Fuzzy-Enabled Wireless Sensor Networks
Wireless sensor nodes can act as distributed detectors for recognizing activities online, with the final goal of assisting the users in their working environment. We propose an act...
Mihai Marin-Perianu, Clemens Lombriser, Oliver Amf...
128
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Distributed blind source separation with an application to audio signals
A scalable blind source separation paradigm aimed at sensor networks is described. The approach facilitates an unlimited number of sensors and sources and does not require a fusio...
Yusuke Hioka, W. Bastiaan Kleijn
CSCW
2000
ACM
15 years 8 months ago
Shared walk environment using locomotion interfaces
By sharing data regarding the sensations experienced by individuals, as well as by sharing their knowledge, we are readily able to communicate with each other, and there are possi...
Hiroaki Yano, Haruo Noma, Hiroo Iwata, Tsutomu Miy...