Sciweavers

215 search results - page 41 / 43
» Time synchronization attacks in sensor networks
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 11 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
OPODIS
2004
15 years 1 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
SMC
2007
IEEE
129views Control Systems» more  SMC 2007»
15 years 5 months ago
Using micro-climate sensing to enhance RF localization in assisted living environments
In this paper, we propose micro-climate sensing as an effective means of enhancing conventional RF-based localization. Our system targets people tracking applications in dynamic i...
Anthony Rowe, Zane Starr, Raj Rajkumar
HYBRID
2010
Springer
15 years 6 months ago
On integration of event-based estimation and robust MPC in a feedback loop
The main purpose of event-based control, if compared to periodic control, is to minimize data transfer or processing power in networked control systems. Current methods have an (i...
Joris Sijs, Mircea Lazar, W. P. M. H. Heemels
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig