Sciweavers

741 search results - page 106 / 149
» Privacy-Aware Location Sensor Networks
Sort
View
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
14 years 7 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
ACSAC
2006
IEEE
15 years 3 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
ICRA
2006
IEEE
111views Robotics» more  ICRA 2006»
15 years 3 months ago
Placement and Distributed Deployment of Sensor Teams for Triangulation based Localization
— We address the problem of placing a sensor network so as to minimize the uncertainty in estimating the position of targets. The novelty of our formulation is in the sensing mod...
Volkan Isler
ADHOCNOW
2004
Springer
15 years 3 months ago
Cross-Layer Optimization for High Density Sensor Networks: Distributed Passive Routing Decisions
Abstract. The resource limited nature of WSNs require that protocols implemented on these networks be energy-efficient, scalable and distributed. This paper presents an analysis of...
Primoz Skraba, Hamid K. Aghajan, Ahmad Bahai
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 4 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan