Sciweavers

139 search results - page 23 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
SIGSOFT
2008
ACM
15 years 10 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
MOBICOM
2004
ACM
15 years 3 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
15 years 4 months ago
Teaching a robot to operate a lift
—This paper discusses a vision problem for the detection of lift operation panel which is a plane subject to deformation due to viewing angle change. The key problem in this proj...
Han Wang, Y. Ying, V. P. Dinh, B. Y. Xie, Danwei W...
ICCCN
2008
IEEE
15 years 4 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
ICDCS
2010
IEEE
14 years 10 months ago
3DLoc: Three Dimensional Wireless Localization Toolkit
In this paper, we present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11compliant mobile device in a three dimensional (3D) space. 3DLoc feat...
Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei ...