Sciweavers

3426 search results - page 659 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 27 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
ICASSP
2010
IEEE
14 years 12 months ago
Convergence analysis of consensus-based distributed clustering
This paper deals with clustering of spatially distributed data using wireless sensor networks. A distributed low-complexity clustering algorithm is developed that requires one-hop...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
CONCURRENCY
2008
89views more  CONCURRENCY 2008»
14 years 12 months ago
An experiment with reflective middleware to support grid-based flood monitoring
Flooding is a growing problem, which affects more than 10% of the UK population. The cost of damage caused by flooding correlates closely with the warning time given before a floo...
Danny Hughes, Phil Greenwood, Gordon S. Blair, Geo...
99
Voted
CORR
2006
Springer
70views Education» more  CORR 2006»
14 years 12 months ago
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
- In this paper, computational aspects of the panel aggregation problem are addressed. Motivated primarily by applications of risk assessment, an algorithm is developed for aggrega...
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Oshe...
MOBISYS
2009
ACM
16 years 10 days ago
SoundSense: scalable sound sensing for people-centric applications on mobile phones
Top end mobile phones include a number of specialized (e.g., accelerometer, compass, GPS) and general purpose sensors (e.g., microphone, camera) that enable new people-centric sen...
Hong Lu, Wei Pan, Nicholas D. Lane, Tanzeem Choudh...