Sciweavers

657 search results - page 124 / 132
» Secure encrypted-data aggregation for wireless sensor networ...
Sort
View
SENSYS
2009
ACM
15 years 4 months ago
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson,...
PERCOM
2003
ACM
15 years 9 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
CORR
2008
Springer
192views Education» more  CORR 2008»
14 years 8 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
76
Voted
TPDS
2010
99views more  TPDS 2010»
14 years 8 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
Temporary Interconnection of ZigBee Personal Area Network (PAN)
—ZigBee is popular for Wireless Sensor Network (WSN) devices because of its low power consumption, built-in security method and ratified specifications. With these features, it...
Sewook Jung, Alexander Chang, Mario Gerla