Sciweavers

197 search results - page 18 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
14 years 12 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
DIM
2009
ACM
15 years 4 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ICRA
2006
IEEE
131views Robotics» more  ICRA 2006»
15 years 5 months ago
A Practical Algorithm for Network Topology Inference
— When a network of robots or static sensors is emplaced in an environment, the spatial relationships between the sensing units must be inferred or computed for most key applicat...
Dimitri Marinakis, Gregory Dudek
IWQOS
2005
Springer
15 years 5 months ago
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks
Abstract. Object detection quality and network lifetime are two conflicting aspects of a sensor network, but both are critical to many sensor applications such as military surveil...
Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodo...
EMNETS
2007
15 years 3 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic