Sciweavers

1850 search results - page 251 / 370
» On the Sensitivity of Sensor Network Simulations
Sort
View
CDC
2008
IEEE
112views Control Systems» more  CDC 2008»
15 years 2 months ago
Information fusion strategies from distributed filters in packet-drop networks
Abstract-- In this paper we study different distributed estimation schemes for stochastic discrete time linear systems where the communication between the sensors and the estimatio...
Alessandro Chiuso, Luca Schenato
149
Voted
DSN
2005
IEEE
15 years 6 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
GLOBECOM
2007
IEEE
15 years 7 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
CCS
2005
ACM
15 years 6 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
133
Voted
CORR
2008
Springer
127views Education» more  CORR 2008»
14 years 11 months ago
Flexible Time-Triggered Sampling in Smart Sensor-Based Wireless Control Systems
: Wireless control systems (WCSs) often have to operate in dynamic environments where the network traffic load may vary unpredictably over time. The sampling in sensors is conventi...
Feng Xia, Wenhong Zhao