Sciweavers

769 search results - page 151 / 154
» Building Intrusion Detection with a Wireless Sensor Network
Sort
View
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
15 years 8 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
PERCOM
2003
ACM
16 years 4 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
BSN
2011
IEEE
233views Sensor Networks» more  BSN 2011»
14 years 4 months ago
Compressive Sensing of Neural Action Potentials Using a Learned Union of Supports
—Wireless neural recording systems are subject to stringent power consumption constraints to support long-term recordings and to allow for implantation inside the brain. In this ...
Zainul Charbiwala, Vaibhav Karkare, Sarah Gibson, ...
ICRA
2005
IEEE
217views Robotics» more  ICRA 2005»
15 years 10 months ago
Development of an Autonomous Mobile Surveillance System Using a Network-based RTK-GPS
- This paper describes an autonomous mobile surveillance system usually used in a factory premises with some high-rise buildings. This system consists of a wireless LAN network, a ...
Jun-ichi Meguro, Takumi Hashizume, Jun-ichi Takigu...
DSRT
2003
IEEE
15 years 9 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller