Sciweavers

139 search results - page 28 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
DSN
2005
IEEE
14 years 4 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
SSDBM
2006
IEEE
111views Database» more  SSDBM 2006»
14 years 4 months ago
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
MOBICOM
2010
ACM
13 years 11 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
MOBIQUITOUS
2007
IEEE
14 years 5 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel