Sciweavers

858 search results - page 105 / 172
» User Authentication in Sensor Networks
Sort
View
HPCS
2006
IEEE
15 years 4 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
INFOCOM
2008
IEEE
15 years 4 months ago
Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks
—We study the problem of data-driven routing and navigation in a distributed sensor network over a continuous scalar field. Specifically, we address the problem of searching fo...
Rik Sarkar, Xianjin Zhu, Jie Gao, Leonidas J. Guib...
DIMVA
2011
14 years 1 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
CVPR
1999
IEEE
15 years 12 months ago
Vision-Based Speaker Detection Using Bayesian Networks
The development of user interfaces based on vision and speech requires the solution of a challenging statistical inference problem: The intentions and actions of multiple individu...
James M. Rehg, Kevin P. Murphy, Paul W. Fieguth
VTC
2006
IEEE
179views Communications» more  VTC 2006»
15 years 4 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu