Sciweavers

306 search results - page 34 / 62
» Advanced Evasive Data Storage in Sensor Networks
Sort
View
111
Voted
ACSAC
2006
IEEE
15 years 9 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
129
Voted
SENSYS
2006
ACM
15 years 9 months ago
Data analysis tools for sensor-based science
Science is increasingly driven by data collected automatically from arrays of inexpensive sensors. The collected data volumes require a different approach from the scientists'...
Stuart Ozer, Jim Gray, Alexander S. Szalay, Andrea...
150
Voted
DMSN
2005
ACM
15 years 5 months ago
The threshold join algorithm for top-k queries in distributed sensor networks
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Demetrios Zeinalipour-Yazti, Zografoula Vagena, Di...
113
Voted
SUTC
2006
IEEE
15 years 9 months ago
Sensor Networks for Everyday Use: The BL-Live Experience
With 250,000 NTD invested, 6 man power allocated, and 9 month time elapsed, we present BLLive. The seemingly dumb, senseless BL Hall at National Taiwan University is transformed t...
Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Ju...
120
Voted
SSDBM
2007
IEEE
116views Database» more  SSDBM 2007»
15 years 10 months ago
A Distributed Algorithm for Joins in Sensor Networks
Given their autonomy, flexibility and large range of functionality, wireless sensor networks can be used as an effective and discrete means for monitoring data in many domains. T...
Alexandru Coman, Mario A. Nascimento