Sciweavers

5815 search results - page 1008 / 1163
» Self-monitoring for sensor networks
Sort
View
98
Voted
RAID
2007
Springer
15 years 7 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
118
Voted
IPSN
2005
Springer
15 years 6 months ago
Design considerations for solar energy harvesting wireless embedded systems
Abstract— Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energ...
Vijay Raghunathan, Aman Kansal, Jason Hsu, Jonatha...
109
Voted
PODC
2010
ACM
15 years 5 months ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...
103
Voted
CIA
2006
Springer
15 years 4 months ago
The Helpful Environment: Distributed Agents and Services Which Cooperate
Imagine a future environment where networks of agents - people, robots and software agents - interact with sophisticated sensor grids and environmental actuators to provide advice,...
Austin Tate
96
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Mobility increases the connectivity of K-hop clustered wireless networks
In this paper we investigate the connectivity for large-scale clustered wireless sensor and ad hoc networks. We study the effect of mobility on the critical transmission range fo...
Qingsi Wang, Xinbing Wang, Xiaojun Lin
« Prev « First page 1008 / 1163 Last » Next »