Sciweavers

2362 search results - page 399 / 473
» The wireless network jamming problem
Sort
View
ESAS
2007
Springer
15 years 8 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ISICT
2003
15 years 6 months ago
Towards a natural interface to adaptive service composition
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Steffen Higel, Tony O'Donnell, Vincent Wade
COMCOM
2006
79views more  COMCOM 2006»
15 years 5 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
TIT
2008
95views more  TIT 2008»
15 years 4 months ago
Distributed Estimation Via Random Access
The problem of distributed Bayesian estimation is considered in the context of a wireless sensor network. The Bayesian estimation performance is analyzed in terms of the expected F...
Animashree Anandkumar, Lang Tong, Ananthram Swami
IPPS
2010
IEEE
15 years 2 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...