-
2
-
-
34748841665
-
Research directions in requirements engineering
-
DOI 10.1109/FOSE.2007.17, 4221627, FoSE 2007: Future of Software Engineering
-
B. H. C. Cheng and J. M. Atlee, "Research directions in requirements engineering," in Future of Software Engineering, Minneapolis, MN, June 2007, pp. 285-303. (Pubitemid 47484932)
-
(2007)
FoSE 2007: Future of Software Engineering
, pp. 285-303
-
-
Cheng, B.H.C.1
Atlee, J.M.2
-
3
-
-
49649119406
-
Cyber physical systems: Design challenges
-
Orlando, Florida, USA, May
-
E. Lee, "Cyber physical systems: Design challenges," in 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing, Orlando, Florida, USA, May 2008, pp. 363-369.
-
(2008)
11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing
, pp. 363-369
-
-
Lee, E.1
-
4
-
-
33947158846
-
Multiple tracking based anomaly detection of mobile nodes
-
Guangzhou, China, Nov.
-
S.-Z. Yu, "Multiple tracking based anomaly detection of mobile nodes," in 2nd International Conference on Mobile Technology, Applications and Systems, Guangzhou, China, Nov. 2005, pp. 1-5.
-
(2005)
2nd International Conference on Mobile Technology, Applications and Systems
, pp. 1-5
-
-
Yu, S.-Z.1
-
5
-
-
64549083325
-
A novel node selection method of bearings-only sensors for target tracking in wireless sensor networks
-
Kunming, Yunnan, China, Jan
-
Y. Han and W. Zhao, "A novel node selection method of bearings-only sensors for target tracking in wireless sensor networks," in 2009 WRI International Conference on Communications and Mobile Computing, vol. 1, Kunming, Yunnan, China, Jan. 2009, pp. 136-140.
-
(2009)
2009 WRI International Conference on Communications and Mobile Computing
, vol.1
, pp. 136-140
-
-
Han, Y.1
Zhao, W.2
-
6
-
-
50249138697
-
A simple multi-point surveillance scheme of a moving target for wireless sensor networks
-
Washington, DC, USA, Nov. 2007
-
K. Tsukamoto, H. Ueda, H. Tamura, J. Wang, K. Kawahara, Y. Oie, and T. Suda, "A simple multi-point surveillance scheme of a moving target for wireless sensor networks," in IEEE Globecom 2007 Workshops, Washington, DC, USA, Nov. 2007, pp. 1-8.
-
IEEE Globecom 2007 Workshops
, pp. 1-8
-
-
Tsukamoto, K.1
Ueda, H.2
Tamura, H.3
Wang, J.4
Kawahara, K.5
Oie, Y.6
Suda, T.7
-
7
-
-
77951114111
-
Positioning and tracking algorithm using node selection method in wireless sensor networks
-
Auckland, New Zealand, Dec.
-
Y. Kashiwabara, K. Taniguchi, and R. Kohno, "Positioning and tracking algorithm using node selection method in wireless sensor networks," in IEEE International Symposium on Information Theory and Its Applications, Auckland, New Zealand, Dec. 2008, pp. 1-6.
-
(2008)
IEEE International Symposium on Information Theory and Its Applications
, pp. 1-6
-
-
Kashiwabara, Y.1
Taniguchi, K.2
Kohno, R.3
-
8
-
-
33748966268
-
ARIADNE: A dynamic indoor signal map construction and localization system
-
MobiSys 2006 - Fourth International Conference on Mobile Systems, Applications and Services
-
Y. Ji, S. Biaz, S. Pandey, and P. Agrawal, "Ariadne: a dynamic indoor signal map construction and localization system," in 4th ACM international conference on Mobile systems, applications and services, Uppsala, Sweden, 2006, pp. 151-164. (Pubitemid 44440795)
-
(2006)
MobiSys 2006 - Fourth International Conference on Mobile Systems, Applications and Services
, vol.2006
, pp. 151-164
-
-
Ji, Y.1
Biaz, S.2
Pandey, S.3
Agrawal, P.4
-
9
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Breckenridge, CO, USA
-
A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in 6th ACM international conference on Mobile systems, applications, and services, Breckenridge, CO, USA, 2008, pp. 225-238.
-
(2008)
6th ACM International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
10
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in 5th ACM workshop on Wireless security, Los Angeles, California, 2006, pp. 43-52. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
11
-
-
35148882671
-
Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems
-
M.-L. Shyu, T. Quirino, Z. Xie, S.-C. Chen, and L. Chang, "Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems," ACM Trans. Auton. Adapt. Syst., vol. 2, no. 3, p. 9, 2007.
-
(2007)
ACM Trans. Auton. Adapt. Syst.
, vol.2
, Issue.3
, pp. 9
-
-
Shyu, M.-L.1
Quirino, T.2
Xie, Z.3
Chen, S.-C.4
Chang, L.5
-
12
-
-
37849047189
-
Providing vanet security through active position detection
-
Montreal, Quebec, Canada, Sept.
-
G. Y. Yan, G. Choudhary, M. C. Weigle, and S. Olariu, "Providing vanet security through active position detection," in 4th ACM international workshop on Vehicular ad hoc networks, Montreal, Quebec, Canada, Sept. 2007, pp. 73-74.
-
(2007)
4th ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 73-74
-
-
Yan, G.Y.1
Choudhary, G.2
Weigle, M.C.3
Olariu, S.4
-
13
-
-
60349085356
-
Localization of mobile users using trajectory matching
-
San Francisco, California, USA
-
H. Lee, M. Wicke, B. Kusy, and L. Guibas, "Localization of mobile users using trajectory matching," in 1st ACM international workshop on Mobile entity localization and tracking in GPS-less environments, San Francisco, California, USA, 2008, pp. 123-128.
-
(2008)
1st ACM International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments
, pp. 123-128
-
-
Lee, H.1
Wicke, M.2
Kusy, B.3
Guibas, L.4
-
14
-
-
79959317465
-
Security challenges in next generation cyber physical systems
-
Pittsburgh, Pennsylvania, Nov.
-
M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee, "Security challenges in next generation cyber physical systems," in Beyond SCADA: Networked Embedded Control for Cyber Physical Systems, Pittsburgh, Pennsylvania, Nov. 2006.
-
(2006)
Beyond SCADA: Networked Embedded Control for Cyber Physical Systems
-
-
Anand, M.1
Cronin, E.2
Sherr, M.3
Blaze, M.4
Ives, Z.5
Lee, I.6
|