Sciweavers

2282 search results - page 385 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
ICC
2007
IEEE
185views Communications» more  ICC 2007»
15 years 10 months ago
Maximal Lifetime Rate and Power Allocation for Sensor Networks with Data Distortion Constraints
— We address a lifetime maximization problem for a single-hop wireless sensor network where multiple sensors encode and communicate their measurements of a Gaussian random source...
James C. F. Li, Subhrakanti Dey, Jamie S. Evans
TON
2008
121views more  TON 2008»
15 years 4 months ago
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
Many multicast overlay networks maintain application-specific performance goals by dynamically adapting the overlay structure when the monitored performance becomes inadequate. Thi...
Aaron Walters, David Zage, Cristina Nita-Rotaru
GLOBECOM
2006
IEEE
15 years 10 months ago
On the Performance of Cooperative Wireless Fixed Relays in Asymmetric Channels
Abstract— In many scenarios the commonly assumed symmetry in multiple relay channels is unrealistic. Therefore, this paper, through analytical and simulation efforts, investigate...
Abdulkareem Adinoyi, Halim Yanikomeroglu
HPCC
2007
Springer
15 years 10 months ago
A Data Imputation Model in Sensor Databases
Data missing is a common problem in database query processing, which can cause bias or lead to inefficient analyses, and this problem happens more often in sensor databases. The re...
Nan Jiang
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 9 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen