SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:9781424408269 "

Search: L773:9781424408269

  • Result 1-4 of 4
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Chatzigiannakis, I., et al. (author)
  • A decentralized intrusion detection system for increasing security of wireless sensor networks
  • 2007
  • In: ETFA 2007. - : IEEE. - 1424408261 - 9781424408269 ; , s. 1408-1411
  • Conference paper (peer-reviewed)abstract
    • Large-scale sensor networks, monitoring an environment at close range with high spatial and temporal resolutions are expected to play an important role in various applications, e.g., assessing the "health" of machines; environmental, medical, food-safety, and habitat monitoring; inventory control, building automation, etc. Ensuring the security of these complex and yet resource-constrained systems has emerged as one of the most pressing challenges for researchers. In this paper (i) we present the major threats, and (ii) we present a new approach for decentralized energy efficient intrusion detection that can be used to improve security from both external and internal adversaries.
  •  
2.
  • Kaczynski, Giordano A., et al. (author)
  • Deriving Exact Stochastic Response Times of Periodic Tasks in Hybrid Priority-driven Soft Real-time Systems
  • 2007
  • In: Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'07), Patras, Greece. - 9781424408269 ; , s. 101-110
  • Conference paper (peer-reviewed)abstract
    • The aim of this paper is to allow for hybrid task sets in the context of stochastic real-time analysis. The paper goes beyond previous work by allowing for the presence of aperiodic tasks in the system. Instead of representing a task with a fixed activation period and a Worst-Case Execution Time (WCET), here a task is characterized by an Arrival Profile (AP) and an Execution Time Profile (ETP), both given by random variables with known distributions. Any number of aperiodic tasks, with arbitrary arrival and execution time profiles, can be dealt with. To cope with the unbounded interference introduced by aperiodic tasks in the system, sporadic and aperiodic tasks are encapsulated within servers. The paper presents the calculus for obtaining the exact ETP of servers, which allows us to derive exact response time distributions of periodic tasks. Also, an example is used to show the potential and validity of the proposed approach. 
  •  
3.
  • Larsson, Tony (author)
  • Surveillance of mobile objects using coordinated wireless sensor nodes
  • 2007
  • In: IEEE Conference on Emerging Technologies and Factory Automation, 2007. ETFA. - Piscataway, NJ. : IEEE Press. - 9781424408269 ; , s. 900-903
  • Conference paper (peer-reviewed)abstract
    • Surveillance of mobile office assets is made by attaching wireless sensor nodes to assets and to their authorized users. The wireless sensor nodes are monitored via radio base access points connected to a distributed application framework for analysis and coordination of security events. By logic rules applied to the event information, temporarily stored and accessible in a distributed tuple space, security decisions, alarms and other actions are implemented.
  •  
4.
  • Neander, Jonas, et al. (author)
  • Wireless Vibration Monitoring (WiVib) - An Industrial Case Study
  • 2007
  • In: 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007). - : Institute of Electrical and Electronics Engineers (IEEE). - 9781424408269 - 9781424408252 ; , s. 920-923
  • Conference paper (peer-reviewed)abstract
    • Testing in realistic environments is often overlooked in the early development of new technology. This paper describes a test to evaluate the whole chain from an accelerometer mounted on a motor to a sensor node sending wireless data to an access point. A pilot gives a great opportunity to get input from end-users (which could be very useful at the initial stages of a project), and provide potential contacts for next pilots.The goal of the pilot was to get a better understanding of the targeted environment and possible interference It may also lead to the discovery of issues not yet thought of, issues important for the resulting design of the end product.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-4 of 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view