Sciweavers

235 search results - page 46 / 47
» The intrusion detection in mobile sensor network
Sort
View
RAID
2005
Springer
13 years 11 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
13 years 12 months ago
A Decision-Making Framework for Control Strategies in Probabilistic Search
Abstract— This paper presents the search problem formulated as a decision problem, where the searcher decides whether the target is present in the search region, and if so, where...
Timothy H. Chung, Joel W. Burdick
UCS
2004
Springer
13 years 11 months ago
Real-World Interaction with Camera Phones
With the integration of cameras, mobile phones have evolved into networked personal image capture devices. Camera-phones can perform image processing tasks on the device itself an...
Michael Rohs
SENSYS
2010
ACM
13 years 3 months ago
SensLoc: sensing everyday places and paths using less energy
Continuously understanding a user's location context in colloquial terms and the paths that connect the locations unlocks many opportunities for emerging applications. While ...
Donnie H. Kim, Younghun Kim, Deborah Estrin, Mani ...
SAC
2010
ACM
14 years 13 days ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...