Sciweavers

3887 search results - page 556 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
116
Voted
HCI
2007
15 years 4 months ago
Sensor-Driven Adaptation of Web Document Presentation
The increasing variety of user device technologies has raised the necessity for ubiquitous content provision, which is characterized by “intelligent” content delivery to end us...
Spyros Nathanail, Vassileios Tsetsos, Stathes Hadj...
172
Voted
ICDCN
2011
Springer
14 years 7 months ago
Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surve...
Congduc Pham
110
Voted
ISWC
2003
IEEE
15 years 8 months ago
Sensing and Modeling Human Networks using the Sociometer
Knowledge of how people interact is important in many disciplines, e.g. organizational behavior, social network analysis, information diffusion and knowledge management applicatio...
Tanzeem Choudhury, Alex Pentland
134
Voted
BNCOD
2008
129views Database» more  BNCOD 2008»
15 years 4 months ago
A Semantics for a Query Language over Sensors, Streams and Relations
Abstract. We introduce a query language over sensors, streams and relations and formally describe its semantics. Although the language was specifically designed for sensor network ...
Christian Y. A. Brenninkmeijer, Ixent Galpin, Alva...