Sciweavers

759 search results - page 123 / 152
» Robust Edge Detection in Wireless Sensor Networks
Sort
View
RTCSA
2005
IEEE
15 years 3 months ago
An Overview of the VigilNet Architecture
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Tian He, Liqian Luo, Ting Yan, Lin Gu, Qing Cao, G...
SASN
2006
ACM
15 years 3 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
88
Voted
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
14 years 7 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...
81
Voted
AAAI
2006
14 years 11 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...