Sciweavers

1482 search results - page 275 / 297
» Data replication in collaborative sensor network systems
Sort
View
117
Voted
SASN
2003
ACM
15 years 5 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
HYBRID
2010
Springer
15 years 7 months ago
On integration of event-based estimation and robust MPC in a feedback loop
The main purpose of event-based control, if compared to periodic control, is to minimize data transfer or processing power in networked control systems. Current methods have an (i...
Joris Sijs, Mircea Lazar, W. P. M. H. Heemels
PERCOM
2004
ACM
15 years 12 months ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...
102
Voted
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 6 months ago
Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed
— Hydra is a flexible wireless network testbed being developed at UT Austin. Our focus is networks that support multiple wireless hops and where the network, especially the MAC,...
Ketan Mandke, Soon-Hyeok Choi, Gibeom Kim, Robert ...
RAID
2001
Springer
15 years 4 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner