Sciweavers

769 search results - page 142 / 154
» Building Intrusion Detection with a Wireless Sensor Network
Sort
View
USENIX
2007
15 years 2 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
TMC
2012
13 years 2 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
CCGRID
2005
IEEE
15 years 5 months ago
A high performance configurable transport protocol for grid computing
− Grid computing infrastructures and applications are increasingly diverse, with networks ranging from very high bandwidth optical networks to wireless networks and applications ...
Xinran (Ryan) Wu, Andrew A. Chien, Matti A. Hiltun...
ADHOCNETS
2009
Springer
15 years 6 months ago
MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling
Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One o...
Panneer Muthukumaran, Rodolfo de Paz Alberola, Ros...
PERCOM
2007
ACM
15 years 11 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...