Sciweavers

1423 search results - page 187 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
TreeMAC: Localized TDMA MAC Protocol for Real-time High-data-rate Sensor Networks
—Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This m...
Wen-Zhan Song, Renjie Huang, Behrooz Shirazi, Rich...
CIMCA
2005
IEEE
15 years 3 months ago
Scenario Based Fault Detection in Context-Aware Ubiquitous Systems using Bayesian Networks
We define the use of Bayesian Networks for fault detection in the perception mechanism of context-aware ubiquitous systems. This paper1 describes the complete working of such a f...
Bilal Ahmed, Young-Koo Lee, Sungyoung Lee, Yonil Z...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 4 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 4 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
AINA
2005
IEEE
15 years 3 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho