-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38, 393–422 (2002)
-
(2002)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84881299497
-
Enabling Effective Programming and Flexible Management of Efficient Body Sensor Network Applications
-
Fortino, G., Giannantonio, R., Gravina, R., Kuryloski, P., Jafari, R.: Enabling Effective Programming and Flexible Management of Efficient Body Sensor Network Applications. IEEE Transactions on Human-Machine Systems 43(1), 115–133 (2013)
-
(2013)
IEEE Transactions on Human-Machine Systems
, vol.43
, Issue.1
, pp. 115-133
-
-
Fortino, G.1
Giannantonio, R.2
Gravina, R.3
Kuryloski, P.4
Jafari, R.5
-
4
-
-
84867562909
-
A flexible building management framework based on wireless sensor and actuator networks
-
Fortino, G., Guerrieri, A., O’Hare, G., Ruzzelli, A.: A flexible building management framework based on wireless sensor and actuator networks. Journal of Network and Computer Applications 35, 1934–1952 (2012)
-
(2012)
Journal of Network and Computer Applications
, vol.35
, pp. 1934-1952
-
-
Fortino, G.1
Guerrieri, A.2
O’hare, G.3
Ruzzelli, A.4
-
5
-
-
84892876987
-
Anomaly detection in sensor systems using lightweight machine learning
-
Bosman, H., Liotta, A., Iacca, G., W¨ortche, H.: Anomaly detection in sensor systems using lightweight machine learning. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 7–13 (2013)
-
(2013)
IEEE International Conference on Systems, Man, and Cybernetics (SMC
, pp. 7-13
-
-
Bosman, H.1
Liotta, A.2
Iacca, G.3
-
6
-
-
84898039429
-
Online extreme learning on fixedpoint sensor networks
-
Bosman, H., Liotta, A., Iacca, G., W¨ortche, H.: Online extreme learning on fixedpoint sensor networks. In: IEEE 13th International Conference on Data Mining Workshops (ICDMW), pp. 319–326 (2013)
-
(2013)
IEEE 13th International Conference on Data Mining Workshops (ICDMW
, pp. 319-326
-
-
Bosman, H.1
Liotta, A.2
Iacca, G.3
-
7
-
-
55549096341
-
Bibliographical review on reconfigurable fault-tolerant control systems
-
Zhang, Y., Jiang, J.: Bibliographical review on reconfigurable fault-tolerant control systems. Annual Reviews in Control 32(2), 229–252 (2008)
-
(2008)
Annual Reviews in Control
, vol.32
, Issue.2
, pp. 229-252
-
-
Zhang, Y.1
Jiang, J.2
-
8
-
-
34548324813
-
Multivariate online anomaly detection using kernel recursive least squares
-
Ahmed, T., Coates, M., Lakhina, A.: Multivariate online anomaly detection using kernel recursive least squares. In: 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 625–633 (2007)
-
(2007)
26th IEEE International Conference on Computer Communications (INFOCOM
, pp. 625-633
-
-
Ahmed, T.1
Coates, M.2
Lakhina, A.3
-
9
-
-
84868121811
-
A comprehensive survey of data mining-based fraud detection research
-
Phua, C., Lee, V.C.S., Smith-Miles, K., Gayler, R.W.: A comprehensive survey of data mining-based fraud detection research. CoRR abs/1009.6119 (2010)
-
(2010)
CoRR abs/1009
, pp. 6119
-
-
Phua, C.1
Lee, V.C.S.2
Smith-Miles, K.3
Gayler, R.W.4
-
10
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Garcia-Teodoro, P., Díaz-Verdejo, J.E., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security 28(1-2), 18–28 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Díaz-Verdejo, J.E.2
Maciá-Fernández, G.3
Vázquez, E.4
-
11
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics-Doklady 10(8), 707–710 (1966)
-
(1966)
Soviet Physics-Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.1
-
12
-
-
84864182544
-
AWSN-based building management framework to support energy-saving applications in buildings
-
Guerrieri, A., Fortino, G., Ruzzelli, A., O’Hare, G.: AWSN-based building management framework to support energy-saving applications in buildings. In: Advancements in Distributed Computing and Internet Technologies: Trends and Issues, pp. 258–273 (2011)
-
(2011)
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
, pp. 258-273
-
-
Guerrieri, A.1
Fortino, G.2
Ruzzelli, A.3
O’hare, G.4
-
13
-
-
0030084599
-
Parameterized pattern matching: Algorithms and applications
-
Baker, B.S.: Parameterized pattern matching: Algorithms and applications. Journal of Computer and System Sciences 52, 28–42 (1996)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, pp. 28-42
-
-
Baker, B.S.1
-
14
-
-
34548270387
-
Approximate parameterized matching
-
art. 29
-
Hazay, C., Lewenstein, M., Sokol, D.: Approximate parameterized matching. ACM Transactions on Algorithms 3(3), art. 29 (2007)
-
(2007)
ACM Transactions on Algorithms
, vol.3
, pp. 3
-
-
Hazay, C.1
Lewenstein, M.2
Sokol, D.3
-
15
-
-
33947717335
-
Parameterized matching with mismatches
-
Apostolico, A., Erdős, P., Lewenstein, M.: Parameterized matching with mismatches. Journal of Discrete Algorithms 5(1), 135–140 (2007)
-
(2007)
Journal of Discrete Algorithms
, vol.5
, Issue.1
, pp. 135-140
-
-
Apostolico, A.1
Erdős, P.2
Lewenstein, M.3
-
17
-
-
70350012270
-
On the longest common parameterized subsequence
-
Keller, O., Kopelowitz, T., Lewenstein, M.: On the longest common parameterized subsequence. Theoretical Computer Science 410(51), 5347–5353 (2009)
-
(2009)
Theoretical Computer Science
, vol.410
, Issue.51
, pp. 5347-5353
-
-
Keller, O.1
Kopelowitz, T.2
Lewenstein, M.3
-
18
-
-
85019620107
-
Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks
-
USENIX Association, Berkeley
-
Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, NSDI 2004, vol. 1. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, NSDI 2004
, pp. 1
-
-
Levis, P.1
Patel, N.2
Culler, D.3
Shenker, S.4
-
19
-
-
84890408416
-
CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks
-
16, 49
-
Gnawali, O., Fonseca, R., Jamieson, K., Kazandjieva, M., Moss, D., Levis, P.: CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks. ACM Transactions on Sensors Networks 10(1), 16:1–16:49 (2013)
-
(2013)
ACM Transactions on Sensors Networks
, vol.10
, Issue.1
, pp. 1-16
-
-
Gnawali, O.1
Fonseca, R.2
Jamieson, K.3
Kazandjieva, M.4
Moss, D.5
Levis, P.6
|