Sciweavers

914 search results - page 112 / 183
» Transaction-Level Modeling for Sensor Networks Using SystemC
Sort
View
RAID
2000
Springer
15 years 5 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
15 years 8 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema
134
Voted
ICC
2009
IEEE
178views Communications» more  ICC 2009»
14 years 11 months ago
Cross-Layer Design for Energy Conservation in Wireless Sensor Networks
Abstract-- Wireless sensor networks (WSNs) require energyef cient protocols to improve the network lifetime. In this work, we adopt a cross-layer strategy that considers routing an...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
EWSN
2008
Springer
16 years 1 months ago
FiGaRo: Fine-Grained Software Reconfiguration for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
Luca Mottola, Gian Pietro Picco, Adil Amjad Sheikh
FLAIRS
2006
15 years 3 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...