Sciweavers

1692 search results - page 248 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 10 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...

Publication
331views
16 years 11 months ago
On Accurate and Efficient Statistical Counting in Sensor-Based Surveillance Systems
Sensor networks have been used in many surveillance systems, providing statistical information about monitored areas. Accurate counting information (e.g., the distribution of the ...
Shuo Guo, Tian He, Mohamed F. Mokbel, John A. Stan...
ICDCS
2008
IEEE
15 years 6 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
ICC
2007
IEEE
246views Communications» more  ICC 2007»
15 years 6 months ago
AR-TP: An Adaptive and Responsive Transport Protocol for Wireless Mesh Networks
Abstract—Wireless meshing has been envisioned as the economically viable networking paradigm to build up broadband and large-scale wireless commodity networks. Several different ...
Vehbi Cagri Gungor, Pasquale Pace, Enrico Natalizi...
EEE
2004
IEEE
15 years 3 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee