Sciweavers

2282 search results - page 328 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
15 years 10 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
JSAC
2010
91views more  JSAC 2010»
15 years 2 months ago
Constructing low-connectivity and full-coverage three dimensional sensor networks
Abstract—Low-connectivity and full-coverage three dimensional Wireless Sensor Networks (WSNs) have many real-world applications. By low connectivity, we mean there are at least k...
Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, W...
ACSAC
2008
IEEE
15 years 6 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
ICDE
2007
IEEE
107views Database» more  ICDE 2007»
16 years 5 months ago
Many-to-Many Aggregation for Sensor Networks
Wireless sensor networks have enormous potential to aid data collection in a number of areas, such as environmental and wildlife research. In this paper, we address the challenges...
Adam Silberstein, Jun Yang 0001
TON
2010
171views more  TON 2010»
14 years 11 months ago
Constructing Maximum-Lifetime Data-Gathering Forests in Sensor Networks
Abstract--Energy efficiency is critical for wireless sensor networks. The data-gathering process must be carefully designed to conserve energy and extend network lifetime. For appl...
Yan Wu, Zhoujia Mao, Sonia Fahmy, Ness B. Shroff