Sciweavers

1423 search results - page 248 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
PODS
2007
ACM
225views Database» more  PODS 2007»
15 years 10 months ago
Sketching unaggregated data streams for subpopulation-size queries
IP packet streams consist of multiple interleaving IP flows. Statistical summaries of these streams, collected for different measurement periods, are used for characterization of ...
Edith Cohen, Nick G. Duffield, Haim Kaplan, Carste...
MASS
2010
161views Communications» more  MASS 2010»
14 years 4 months ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
15 years 10 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
CASES
2010
ACM
14 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
15 years 3 months ago
Hand Force Estimation using Electromyography Signals
— In many studies and applications that include direct human involvement such as human-robot interaction, control of prosthetic arms, and human factor studies, hand force is need...
Farid Mobasser, Keyvan Hashtrudi-Zaad