-
1
-
-
84860654039
-
Timing control for protecting from internal attacks in wireless sensor networks
-
X. Huang, M. Ahmed, and D. Sharma, "Timing control for protecting from internal attacks in wireless sensor networks, " in 2012 International Conference on Information Networking (ICOIN), 2012, pp. 7-12.
-
(2012)
2012 International Conference on Information Networking (ICOIN
, pp. 7-12
-
-
Huang, X.1
Ahmed, M.2
Sharma, D.3
-
2
-
-
85032751970
-
Detection, classification, and tracking of targets
-
Mar
-
D. Li, K. D. Wong, Y. H. Hu, and A. M. Sayeed, " Detection, classification, and tracking of targets," IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 17-29, Mar.
-
IEEE Signal Processing Magazine
, vol.19
, Issue.2
, pp. 17-29
-
-
Li, D.1
Wong, K.D.2
Hu, Y.H.3
Sayeed, A.M.4
-
3
-
-
84949233683
-
Collaborative classification applications in sensor networks
-
C. Meesookho, S. Narayanan, and C. S. Raghavendra, " Collaborative classification applications in sensor networks," in Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002, 2002, pp. 370-374.
-
(2002)
Sensor Array and Multichannel Signal Processing Workshop Proceedings
, vol.2002
, pp. 370-374
-
-
Meesookho, C.1
Narayanan, S.2
Raghavendra, C.S.3
-
4
-
-
4544317953
-
Energy-efficient surveillance system using wireless sensor networks
-
T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan, L. Gu, J. Hui, and B. Krogh, " Energy-efficient surveillance system using wireless sensor networks," in Pr oceedings of the 2nd international conference on Mobile systems, applications, and services, New York, NY, USA, 2004, pp. 270-283.
-
(2004)
Pr Oceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, New York, NY, USA
, pp. 270-283
-
-
He, T.1
Krishnamurthy, S.2
Stankovic, J.A.3
Abdelzaher, T.4
Luo, L.5
Stoleru, R.6
Yan, T.7
Gu, L.8
Hui, J.9
Krogh, B.10
-
5
-
-
3543065166
-
Distributed control applications within sensor networks
-
Aug.
-
B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert, and S. S. Sastry, " Distributed control applications within sensor networks," Proceedings of the IEEE, vol. 91, no. 8, pp. 1235-1246, Aug. 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1235-1246
-
-
Sinopoli, B.1
Sharp, C.2
Schenato, L.3
Schaffert, S.4
Sastry, S.S.5
-
6
-
-
34247337727
-
Wireless ad hoc sensor and actuator networks on the farm
-
P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain, and G. Bishop-Hurley, " Wireless ad hoc sensor and actuator networks on the farm," in The Fifth International Conference on Information Processing in Sensor Networks, 2006. IPSN 2006, 2006, pp. 492-499.
-
(2006)
The Fifth International Conference on Information Processing in Sensor Networks, 2006. IPSN 2006
, pp. 492-499
-
-
Sikka, P.1
Corke, P.2
Valencia, P.3
Crossman, C.4
Swain, D.5
Bishop-Hurley, G.6
-
7
-
-
20344371727
-
Wireless sensor networks: A new computing platform for tomorrow's Internet
-
F. Zhao, "Wireless sensor networks: A new computing platform for tomorrow's Internet," in Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004, 2004, vol. 1, pp. 1-27 Vol.1.
-
(2004)
Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004
, vol.1
, pp. 1-27
-
-
Zhao, F.1
-
8
-
-
68249129760
-
-
University of California at Berkeley, UC Berkeley Reliable Adaptive Distributed Systems Laboratory, Technical Report UCB/EECS- 2009-28 Feb.
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing, " University of California at Berkeley, UC Berkeley Reliable Adaptive Distributed Systems Laboratory, Technical Report UCB/EECS-2009-28, Feb. 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
9
-
-
77953091118
-
Integration of wireless sensor network with cloud
-
March
-
V. Rajesh , J. M. Gnanasekar, R. S. Ponmagal, and P. Anbalagan, " Integration of Wireless Sensor Network with Cloud," in 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), March, pp. 321-323.
-
2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC)
, pp. 321-323
-
-
Rajesh, V.1
Gnanasekar, J.M.2
Ponmagal, R.S.3
Anbalagan, P.4
-
10
-
-
77954464638
-
Secure cloud computing with brokered trusted sensor networks
-
May
-
A. Kapadia, S. Myers, X. Wang, and G. Fox, "Secure cloud computing with brokered trusted sensor networks, " in 2010 International Symposium on Collaborative Technologies and Systems (CTS), May, pp. 581-592.
-
2010 International Symposium on Collaborative Technologies and Systems (CTS)
, pp. 581-592
-
-
Kapadia, A.1
Myers, S.2
Wang, X.3
Fox, G.4
-
11
-
-
84891087171
-
A taxonomy of internal attacks in wireless sensor network
-
Kuala Lumpur, Malaysia
-
M. Ahmed, X. Huang, and D. Sharma, "A Taxonomy of Internal Attacks in Wireless Sensor Network, " in World Academy of Science, Engineering and Technology, Kuala Lumpur, Malaysia, 2012, pp. 427-430.
-
(2012)
World Academy of Science, Engineering and Technology
, pp. 427-430
-
-
Ahmed, M.1
Huang, X.2
Sharma, D.3
-
12
-
-
84891134456
-
A novel framework for abnormal behaviour identification and detection for wireless sensor networks
-
M. Ahmed, X. Huang, and D. Sharma, " A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks," International Journal of Computer and Communication Engineering, vol. 6, no. 2, pp. 148-151, 2012.
-
(2012)
International Journal of Computer and Communication Engineering
, vol.6
, Issue.2
, pp. 148-151
-
-
Ahmed, M.1
Huang, X.2
Sharma, D.3
-
13
-
-
0000227213
-
On quantile estimation and markov chain monte carlo convergence
-
Sep.
-
S. P. Brooks and G. O. Roberts, "On Quantile Estimation and Markov Chain Monte Carlo Convergence, " Biometrika, vol. 86, no. 3, pp. 710-717, Sep. 1999.
-
(1999)
Biometrika
, vol.86
, Issue.3
, pp. 710-717
-
-
Brooks, S.P.1
Roberts, G.O.2
-
14
-
-
0036986435
-
Efficient tracing of failed nodes in sensor networks
-
New York, NY, USA
-
J. Staddon, D. Balfanz, and G. Durfee, "Efficient tracing of failed nodes in sensor networks, " in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, New York, NY, USA, 2002, pp. 122-130.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
, pp. 122-130
-
-
Staddon, J.1
Balfanz, D.2
Durfee, G.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, " Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th annual international conference on Mobile computing and networking, New York, NY, USA, 2000, pp. 255-265.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
0034546898
-
Intrusion detection in wireless adhoc networks
-
presented at the Boston, Massachusesttes, USA
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless AdHoc Networks, " presented at the ACM MOBICOM, The Annual International Conference on Mobile Computing and Networking, Boston, Massachusesttes, USA, 2000, pp. 275-283.
-
(2000)
ACM MOBICOM, the Annual International Conference on Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
18
-
-
52149113982
-
The intrusion detection method based on game theory in wireless sensor network
-
Y. Ma, H. Cao, and J. Ma, " The intrusion detection method based on game theory in wireless sensor network," in 2008 First IEEE International Conference on Ubi-Media Computing, 2008, pp. 326-331.
-
(2008)
2008 First IEEE International Conference on Ubi-Media Computing
, pp. 326-331
-
-
Ma, Y.1
Cao, H.2
Ma, J.3
-
19
-
-
0345565888
-
The many faces of publish/subscribe
-
Jun.
-
P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec, " The many faces of publish/subscribe," ACM Comput. Surv., vol. 35, no. 2, pp. 114-131, Jun. 2003.
-
(2003)
ACM Comput. Surv.
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
20
-
-
84864055603
-
Efficient privacy preserving content based publish subscribe systems
-
New York, NY, USA
-
M. Nabeel, N. Shang, and E. Bertino, " Efficient privacy preserving content based publish subscribe systems," in Proceedings of the 17th ACM symposium on Access Control Models and Technologies, New York, NY, USA, 2012, pp. 133-144.
-
(2012)
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies
, pp. 133-144
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
21
-
-
84872924778
-
Markov chain monte carlo-based approaches for modeling the spatial survival with conditional autoregressive (car) frailty
-
Dec.
-
N. Iriawan, S. Astutik, and D. D. Prastyo, " Markov Chain Monte Carlo-Based Approaches for Modeling the Spatial Survival with Conditional Autoregressive (CAR) Frailty," International Journal of Computer Science and Network Security,, vol. 10, no. 12, pp. 1-7, Dec. 2012.
-
(2012)
Ternational Journal of Computer Science and Network Security
, vol.10
, Issue.12
, pp. 1-7
-
-
Iriawan, N.1
Astutik, S.2
Prastyo, D.D.3
-
22
-
-
0035591051
-
On the relationship between markov chain monte carlo methods for model uncertainty
-
Jun.
-
S. J. Godsill, " On the Relationship Between Markov Chain Monte Carlo Methods for Model Uncertainty," Journal of Computational and Graphical Statistics, vol. 10, no. 2, pp. 230-248, Jun. 2001.
-
(2001)
Journal of Computational and Graphical Statistics
, vol.10
, Issue.2
, pp. 230-248
-
-
Godsill, S.J.1
|