Sciweavers

771 search results - page 124 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
CSREASAM
2006
13 years 10 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
SENSYS
2006
ACM
14 years 3 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
VTC
2010
IEEE
153views Communications» more  VTC 2010»
13 years 7 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...

Publication
331views
15 years 8 months ago
On Accurate and Efficient Statistical Counting in Sensor-Based Surveillance Systems
Sensor networks have been used in many surveillance systems, providing statistical information about monitored areas. Accurate counting information (e.g., the distribution of the ...
Shuo Guo, Tian He, Mohamed F. Mokbel, John A. Stan...
DAWAK
2008
Springer
13 years 11 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit