Sciweavers

2282 search results - page 432 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
109
Voted
ICDCS
2008
IEEE
15 years 8 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 6 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
110
Voted
TPDS
2010
86views more  TPDS 2010»
15 years 8 days ago
Quality of Trilateration: Confidence-Based Iterative Localization
The proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multilateration, as a bas...
Zheng Yang, Yunhao Liu
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 3 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
127
Voted
SENSYS
2010
ACM
14 years 11 months ago
A case against routing-integrated time synchronization
To achieve more accurate global time synchronization, this paper argues for decoupling the clock distribution network from the routing tree in a multihop wireless network. We find...
Thomas Schmid, Zainul Charbiwala, Zafeiria Anagnos...