Sciweavers

3426 search results - page 574 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
136
Voted
ICCCN
2008
IEEE
15 years 9 months ago
A Structured Hardware/Software Architecture for Embedded Sensor Nodes
—Owing to the limited requirement for sensor processing in early networked sensor nodes, embedded software was generally built around the communication stack. Modern sensor nodes...
Geoff V. Merrett, Alex S. Weddell, Nick R. Harris,...
137
Voted
ACSAC
2008
IEEE
15 years 5 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
132
Voted
IPSN
2009
Springer
15 years 10 months ago
Application-informed radio duty-cycling in a re-taskable multi-user sensing system
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we c...
Omprakash Gnawali, Jongkeun Na, Ramesh Govindan
135
Voted
EWSN
2007
Springer
15 years 7 months ago
Improving the Energy Efficiency of the MANTIS Kernel
Abstract. Event-driven operating systems such as TinyOS are the preferred choice for wireless sensor networks. Alternative designs following a classical multi-threaded approach are...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 10 months ago
Localized Sensor Self-Deployment for Guaranteed Coverage Radius Maximization
—Focused coverage is defined as the coverage of a wireless sensor network surrounding a point of interest (POI), and is measured by coverage radius, i.e., minimum distance from ...
Xu Li, Hannes Frey, Nicola Santoro, Ivan Stojmenov...