Sciweavers

1423 search results - page 128 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
99
Voted
SAINT
2008
IEEE
15 years 4 months ago
Distributed Sensor Information Management Architecture Based on Semantic Analysis of Sensing Data
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
Tomoya Kawakami, Bich Lam Ngoc Ly, Susumu Takeuchi...
CCE
2005
14 years 10 months ago
Use of parallel computers in rational design of redundant sensor networks
A general method to design optimal redundant sensor network even in the case of one sensor failure and able to estimate process key parameters within a required accuracy is propos...
Carine Gerkens, Georges Heyen
90
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Compressive Oversampling for Robust Data Transmission in Sensor Networks
—Data loss in wireless sensing applications is inevitable and while there have been many attempts at coping with this issue, recent developments in the area of Compressive Sensin...
Zainul Charbiwala, Supriyo Chakraborty, Sadaf Zahe...
74
Voted
ICCCN
2007
IEEE
15 years 4 months ago
A Framework for Querying Sensor Networks Using Mobile Devices
—an interplay between mobile devices and static sensor nodes is envisioned in the near future. This will enable a heterogeneous design space that can offset the stringent resourc...
Shourui Tian, Sol M. Shatz, Yang Yu
103
Voted
DBSEC
2008
365views Database» more  DBSEC 2008»
14 years 11 months ago
Secure Construction of Contingency Tables from Distributed Data
Abstract. Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ...
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. A...