Sciweavers

1423 search results - page 187 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
PERCOM
2009
ACM
15 years 11 months ago
TreeMAC: Localized TDMA MAC Protocol for Real-time High-data-rate Sensor Networks
—Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This m...
Wen-Zhan Song, Renjie Huang, Behrooz Shirazi, Rich...
CIMCA
2005
IEEE
15 years 10 months ago
Scenario Based Fault Detection in Context-Aware Ubiquitous Systems using Bayesian Networks
We define the use of Bayesian Networks for fault detection in the perception mechanism of context-aware ubiquitous systems. This paper1 describes the complete working of such a f...
Bilal Ahmed, Young-Koo Lee, Sungyoung Lee, Yonil Z...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 10 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 10 months ago
On Collaboration in a Distributed Multi-Target Tracking Framework
Abstract— A fully-distributed collaborative multi-target tracking framework that eliminates the need for a central data associator or a central coordinating node for wireless sen...
Tolga Onel, Cem Ersoy, Hakan Deliç
AINA
2005
IEEE
15 years 10 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho