Sciweavers

759 search results - page 147 / 152
» Robust Edge Detection in Wireless Sensor Networks
Sort
View
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
INFOCOM
2009
IEEE
15 years 4 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
72
Voted
DAIS
2010
14 years 11 months ago
RESTful Integration of Heterogeneous Devices in Pervasive Environments
Abstract. More and more home devices are equipped with advanced computational capabilities to improve the user satisfaction (e.g., programmable heating system, Internet TV). Althou...
Daniel Romero 0002, Gabriel Hermosillo, Amirhosein...
SENSYS
2010
ACM
14 years 7 months ago
SensLoc: sensing everyday places and paths using less energy
Continuously understanding a user's location context in colloquial terms and the paths that connect the locations unlocks many opportunities for emerging applications. While ...
Donnie H. Kim, Younghun Kim, Deborah Estrin, Mani ...
RAID
2007
Springer
15 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang