Sciweavers

1325 search results - page 187 / 265
» Exploring sensor networks using mobile agents
Sort
View
SUTC
2008
IEEE
15 years 5 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
ICANN
2009
Springer
15 years 5 months ago
Acquiring and Classifying Signals from Nanopores and Ion-Channels
The use of engineered nanopores as sensing elements for chemical and biological agents is a rapidly developing area. The distinct signatures of nanopore-nanoparticle lend themselve...
Bharatan Konnanath, Prasanna Sattigeri, Trupthi Ma...
IDEAL
2010
Springer
14 years 9 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
ISCAS
2002
IEEE
139views Hardware» more  ISCAS 2002»
15 years 4 months ago
Mobility support for Bluetooth public access
Bluetooth technology offers the potential for low-cost, broadband wireless access for a range of mobile and portable devices. It can thus provide for ubiquitous computing across a...
A. Kansal, Uday B. Desai
IPSN
2005
Springer
15 years 4 months ago
eBlocks - an enabling technology for basic sensor based systems
—We describe the development of a set of embedded system building blocks, known as eBlocks. An eBlock network can be viewed as a basic form of sensor network that can be develope...
Susan Cotterell, Ryan Mannion, Frank Vahid, Harry ...