![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Localized Recursive Estimation in Wireless Sensor Networks
This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...
-
Chapter and Conference Paper
Worst and Best Information Exposure Paths in Wireless Sensor Networks
This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...
-
Chapter and Conference Paper
Efficient Group Key Management for Dynamic Peer Networks
In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...
-
Chapter and Conference Paper
Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources
We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...
-
Article
Animmune local concentration based virus detection approach
Along with the evolution of computer viruses, the number of file samples that need to be analyzed has constantly increased. An automatic and robust tool is needed to classify the file samples quickly and effic...
-
Article
Robust optical flow estimation based on brightness correction fields
Optical flow estimation is still an important task in computer vision with many interesting applications. However, the results obtained by most of the optical flow techniques are affected by motion discontinui...
-
Article
Efficient omni-image unwar** using geometric symmetry
In order to save storage space of a pano-map** table used in omni-image unwar**, a geometric symmetry method is proposed. First of all, this method partitions a 360° omni-image into eight 45° omni-image se...
-
Article
Measurement of wireless pressure sensors fabricated in high temperature co-fired ceramic MEMS technology
High temperature co-fired ceramics (HTCCs) have wide applications with stable mechanical properties, but they have not yet been used to fabricate sensors. By introducing the wireless telemetric sensor system a...
-
Article
On the Accuracy of Packet Delay Estimation in Distributed Service Networks
Packet delay (either one-way time or round-trip time) is a very important metric for measuring the performance of networks in a highly dynamic environment such as the Internet. Many network applications are al...
-
Book
-
Chapter
Location Privacy Preservation in Database-Driven Cognitive Radio Networks
Besides spectrum sensing, geo-location database query approach is another typical approach to obtain spectrum availabilities at SU’s location. The database query approach is enforced by the latest FCC’s rule 2...
-
Chapter
Location Privacy Preservation in Collaborative Spectrum Sensing
With the proliferation of mobile devices and the rapid growing of wireless services, cognitive radio networks (CRNs) have been recognized as a promising technology to alleviate the spectrum scarcity problem. T...
-
Chapter
Future Research Directions
Information sharing and transmission is an essential part of SUs in CRNs. Collaborative spectrum sensing requires the sharing of sensing reports between SUs and the FC. In database-driven CRNs, the location in...
-
Chapter and Conference Paper
Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice
After we present some basic definitions and results on non-commutative residuated lattice and several kinds of filters of it, we extend the concept of fuzzy filter to non-commutative residuated lattice. We int...
-
Chapter
Privacy Preservation Techniques
In this chapter, we will introduce some basic concepts and fundamental knowledge of privacy preservation techniques. Privacy preservation has become a major issue across different applications, from data publi...
-
Chapter
Introduction
The rapid proliferation of wireless technology offers the promise of many societal and individual benefits by enabling pervasive networking and communication via personal devices such as smartphones, PDAs, com...
-
Reference Work Entry In depth
Long-Term Quality of Protection
-
Reference Work Entry In depth
Pilot Spoofing Attack
-
Chapter and Conference Paper
Feature Extraction and Selection in Hidden Layer of Deep Learning Based on Graph Compressive Sensing
Faced with massive high-dimensional, multi-modal, and redundant information data sets, there are many processing methods, one of which is deep learning. Although the deep learning model is effective, there is ...
-
Chapter and Conference Paper
A New Node Optimization Algorithm of Wireless Sensor Network Based on Graph Signal
Graph is a great model that can efficiently deal with structural data and has excellent research value and application value in our life. Graph theory and signal processing have been perfectly combined to form...