Sciweavers

759 search results - page 132 / 152
» Robust Edge Detection in Wireless Sensor Networks
Sort
View
ICDCS
2010
IEEE
15 years 1 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 4 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
EJWCN
2010
237views more  EJWCN 2010»
14 years 4 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
ISMAR
2003
IEEE
15 years 2 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...
MOBISYS
2008
ACM
15 years 9 months ago
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detectin...
Kevin A. Li, Timothy Sohn, Steven Huang, William G...