Sciweavers

197 search results - page 28 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
WIOPT
2005
IEEE
15 years 5 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem
97
Voted
MOBICOM
2009
ACM
15 years 6 months ago
Data fusion improves the coverage of wireless sensor networks
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
Guoliang Xing, Rui Tan, Benyuan Liu, Jianping Wang...
GIS
2005
ACM
16 years 21 days ago
In-network surface simplification for sensor fields
Recent research literature on sensor network databases has focused on finding ways to perform in-network aggregation of sensor readings to reduce the message cost. However, with t...
Brian Harrington, Yan Huang
VLDB
2005
ACM
103views Database» more  VLDB 2005»
15 years 5 months ago
Mapping Maintenance for Data Integration Systems
To answer user queries, a data integration system employs a set of semantic mappings between the mediated schema and the schemas of data sources. In dynamic environments sources o...
Robert McCann, Bedoor K. AlShebli, Quoc Le, Hoa Ng...
80
Voted
SAINT
2008
IEEE
15 years 6 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal