Sciweavers

5813 search results - page 1101 / 1163
» Sensor Networks
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
CASCON
2010
174views Education» more  CASCON 2010»
14 years 7 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
EMSOFT
2010
Springer
14 years 7 months ago
TeleScribe: a scalable, resumable wireless reprogramming approach
TeleScribe is a software mechanism for efficiently reprogramming embedded systems such as wireless sensor nodes over a shared communication link. One distinguishing feature is its...
Min-Hua Chen, Pai H. Chou
TSP
2010
14 years 4 months ago
On scalable distributed coding of correlated sources
Abstract--This paper considers the problem of scalable distributed coding of correlated sources that are communicated to a central unit, a setting typically encountered in sensor n...
Ankur Saxena, Kenneth Rose
INFOCOM
2011
IEEE
14 years 1 months ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
« Prev « First page 1101 / 1163 Last » Next »