Sciweavers

3426 search results - page 101 / 686
» Self-identifying sensor data
Sort
View
PODC
2010
ACM
15 years 1 months ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 10 days ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
IJSNET
2008
126views more  IJSNET 2008»
14 years 10 months ago
Reliable and energy-efficient routing protocol in dense wireless sensor networks
Delivering sensed data to the sink reliably in sensor networks calls for a scalable, energy-efficient, and error-resilient routing solution. In this paper, a reliable energy-effic...
Min Chen, Taekyoung Kwon, Shiwen Mao, Yong Yuan, V...
TMC
2008
120views more  TMC 2008»
14 years 9 months ago
Mitigating Performance Degradation in Congested Sensor Networks
Data generated in wireless sensor networks may not all be alike: some data may be more important than others and hence may have different delivery requirements. In this paper, we a...
Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albe...
JDA
2007
135views more  JDA 2007»
14 years 9 months ago
Cache placement in sensor networks under an update cost constraint
In this paper, we address an optimization problem that arises in the context of cache placement in sensor networks. In particular, we consider the cache placement problem where th...
Bin Tang, Himanshu Gupta