Sciweavers

371 search results - page 69 / 75
» Attack-resilient hierarchical data aggregation in sensor net...
Sort
View
CIDM
2007
IEEE
15 years 3 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal
ICNP
2000
IEEE
15 years 1 months ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin
COMCOM
2007
95views more  COMCOM 2007»
14 years 9 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
15 years 11 months ago
Range Efficient Computation of F0 over Massive Data Streams
Efficient one-pass computation of F0, the number of distinct elements in a data stream, is a fundamental problem arising in various contexts in databases and networking. We consid...
Pavan Aduri, Srikanta Tirthapura
ICDE
2009
IEEE
179views Database» more  ICDE 2009»
15 years 4 months ago
Self-Tuning, Bandwidth-Aware Monitoring for Dynamic Data Streams
— We present SMART, a self-tuning, bandwidth-aware monitoring system that maximizes result precision of continuous aggregate queries over dynamic data streams. While prior approa...
Navendu Jain, Praveen Yalagandula, Michael Dahlin,...