Sciweavers

2503 search results - page 307 / 501
» Building Computer Network Attacks
Sort
View
MOBISYS
2009
ACM
16 years 2 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
PERCOM
2008
ACM
16 years 1 months ago
Information Agents for Pervasive Sensor Networks
In this paper, we describe an information agent, that resides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasiv...
Alex Rogers, Mike Osborne, Sarvapali D. Ramchurn, ...
AINA
2007
IEEE
15 years 8 months ago
Wireless Sensor Networks for Home Health Care
— Sophisticated electronics are within reach of average users. Cooperation between wireless sensor networks and existing consumer electronic infrastructures can assist in the are...
Chris R. Baker, Kenneth Armijo, Simon Belka, Merwa...
ICDCS
2005
IEEE
15 years 7 months ago
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications
Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new midd...
Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
126
Voted
DSN
2002
IEEE
15 years 6 months ago
Performance Analysis of a Consensus Algorithm Combining Stochastic Activity Networks and Measurements
Protocols which solve agreement problems are essential building blocks for fault tolerant distributed applications. While many protocols have been published, little has been done ...
Andrea Coccoli, Péter Urbán, Andrea ...