Sciweavers

474 search results - page 37 / 95
» In-Network Outlier Detection in Wireless Sensor Networks
Sort
View
COMCOM
2006
79views more  COMCOM 2006»
14 years 12 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
TSP
2008
131views more  TSP 2008»
14 years 11 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
INFOCOM
2007
IEEE
15 years 6 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...
ALGOSENSORS
2004
Springer
15 years 5 months ago
On the Computational Complexity of Sensor Network Localization
Determining the positions of the sensor nodes in a network is essential to many network functionalities such as routing, coverage and tracking, and event detection. The localizatio...
James Aspnes, David Kiyoshi Goldenberg, Yang Richa...
MOBIHOC
2008
ACM
15 years 11 months ago
Strong barrier coverage of wireless sensor networks
Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to ...
Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipu...