Sciweavers

422 search results - page 71 / 85
» Identity-based attack detection in mobile wireless networks
Sort
View
MOBISYS
2009
ACM
16 years 5 days ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
118
Voted
JSS
2002
198views more  JSS 2002»
14 years 11 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
96
Voted
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 6 months ago
ISROBOTNET: A testbed for sensor and robot network systems
— This paper introduces a testbed for sensor and robot network systems, currently composed of 10 cameras and 5 mobile wheeled robots equipped with several sensors for self-locali...
Marco Barbosa, Alexandre Bernardino, Dario Figueir...
MOBISYS
2009
ACM
16 years 5 days ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
SPRINGSIM
2007
15 years 24 days ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer