Sciweavers

2282 search results - page 455 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 3 days ago
Cooperation and Cognitive Radio
Abstract— Cooperation is increasingly regarded as a key technology for tackling the challenges of a practical implementation of cognitive radio. In this paper, we first give a b...
Osvaldo Simeone, Jonathan Gambini, Yeheskel Bar-Ne...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
14 years 5 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
IEEESP
2006
130views more  IEEESP 2006»
13 years 5 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 2 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
MOBISYS
2008
ACM
14 years 5 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...