Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Localized Recursive Estimation in Wireless Sensor Networks

    This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...

    Bang Wang, Kee Chaing Chua, Vikram Srinivasan in Mobile Ad-hoc and Sensor Networks (2005)

  2. No Access

    Chapter and Conference Paper

    Worst and Best Information Exposure Paths in Wireless Sensor Networks

    This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...

    Bang Wang, Kee Chaing Chua, Wei Wang in Mobile Ad-hoc and Sensor Networks (2005)

  3. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)

  4. No Access

    Chapter and Conference Paper

    Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources

    We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...

    Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar in Distributed Computing in Sensor Systems (2006)

  5. No Access

    Article

    Animmune local concentration based virus detection approach

    Along with the evolution of computer viruses, the number of file samples that need to be analyzed has constantly increased. An automatic and robust tool is needed to classify the file samples quickly and effic...

    Wei Wang, Peng-tao Zhang, Ying Tan, **n-gui He in Journal of Zhejiang University SCIENCE C (2011)

  6. No Access

    Article

    Robust optical flow estimation based on brightness correction fields

    Optical flow estimation is still an important task in computer vision with many interesting applications. However, the results obtained by most of the optical flow techniques are affected by motion discontinui...

    Wei Wang, Zhi-xun Su, **-shan Pan, Ye Wang in Journal of Zhejiang University SCIENCE C (2011)

  7. No Access

    Article

    Efficient omni-image unwar** using geometric symmetry

    In order to save storage space of a pano-map** table used in omni-image unwar**, a geometric symmetry method is proposed. First of all, this method partitions a 360° omni-image into eight 45° omni-image se...

    Zhihui **ong, Irene Cheng, Anup Basu, Wei Wang, Wei Xu in Machine Vision and Applications (2012)

  8. No Access

    Article

    Measurement of wireless pressure sensors fabricated in high temperature co-fired ceramic MEMS technology

    High temperature co-fired ceramics (HTCCs) have wide applications with stable mechanical properties, but they have not yet been used to fabricate sensors. By introducing the wireless telemetric sensor system a...

    Ji-jun **ong, Shi-jun Zheng, Ying-** Hong in Journal of Zhejiang University SCIENCE C (2013)

  9. No Access

    Article

    On the Accuracy of Packet Delay Estimation in Distributed Service Networks

    Packet delay (either one-way time or round-trip time) is a very important metric for measuring the performance of networks in a highly dynamic environment such as the Internet. Many network applications are al...

    Nafei Zhu, **gsha He, Yue Zhou, Wei Wang in Journal of Network and Systems Management (2013)

  10. No Access

    Book

  11. No Access

    Chapter

    Location Privacy Preservation in Database-Driven Cognitive Radio Networks

    Besides spectrum sensing, geo-location database query approach is another typical approach to obtain spectrum availabilities at SU’s location. The database query approach is enforced by the latest FCC’s rule 2...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  12. No Access

    Chapter

    Location Privacy Preservation in Collaborative Spectrum Sensing

    With the proliferation of mobile devices and the rapid growing of wireless services, cognitive radio networks (CRNs) have been recognized as a promising technology to alleviate the spectrum scarcity problem. T...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  13. No Access

    Chapter

    Future Research Directions

    Information sharing and transmission is an essential part of SUs in CRNs. Collaborative spectrum sensing requires the sharing of sensing reports between SUs and the FC. In database-driven CRNs, the location in...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  14. No Access

    Chapter and Conference Paper

    Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice

    After we present some basic definitions and results on non-commutative residuated lattice and several kinds of filters of it, we extend the concept of fuzzy filter to non-commutative residuated lattice. We int...

    Wei Wang, Yang Xu, Dan Tong, **ao-yan Cheng in Proceedings of International Conference on… (2014)

  15. No Access

    Chapter

    Privacy Preservation Techniques

    In this chapter, we will introduce some basic concepts and fundamental knowledge of privacy preservation techniques. Privacy preservation has become a major issue across different applications, from data publi...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  16. No Access

    Chapter

    Introduction

    The rapid proliferation of wireless technology offers the promise of many societal and individual benefits by enabling pervasive networking and communication via personal devices such as smartphones, PDAs, com...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  17. No Access

    Reference Work Entry In depth

    Long-Term Quality of Protection

    Wei Wang, Tao Jiang, Qian Zhang in Encyclopedia of Wireless Networks (2020)

  18. No Access

    Reference Work Entry In depth

    Pilot Spoofing Attack

    Wei Wang in Encyclopedia of Wireless Networks (2020)

  19. No Access

    Chapter and Conference Paper

    Feature Extraction and Selection in Hidden Layer of Deep Learning Based on Graph Compressive Sensing

    Faced with massive high-dimensional, multi-modal, and redundant information data sets, there are many processing methods, one of which is deep learning. Although the deep learning model is effective, there is ...

    Yifei Yuan, Lei Xu, Yiman Ma, Wei Wang in Artificial Intelligence in China (2021)

  20. No Access

    Chapter and Conference Paper

    A New Node Optimization Algorithm of Wireless Sensor Network Based on Graph Signal

    Graph is a great model that can efficiently deal with structural data and has excellent research value and application value in our life. Graph theory and signal processing have been perfectly combined to form...

    Lei Xu, Yifei Yuan, Wei Wang in Artificial Intelligence in China (2021)

previous disabled Page of 2