Sciweavers

668 search results - page 122 / 134
» Time-based localization for asynchronous wireless sensor net...
Sort
View
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
MOBISYS
2009
ACM
14 years 8 months ago
SolarStore: enhancing data reliability in solar-powered storage-centric sensor networks
In this paper, we present a reliable storage service, called SolarStore, that adaptively trades-off storage reliability versus energy consumption in solar-powered sensor networks....
Yong Yang, Lili Wang, Dong Kun Noh, Hieu Khac Le, ...
OPODIS
2004
13 years 9 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
AINA
2010
IEEE
13 years 11 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
MOBISYS
2003
ACM
14 years 7 months ago
The Lighthouse Location System for Smart Dust
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
Kay Römer