Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Anthony D. Wood"'
Autor:
Jeremy J. Vaudo, Guy M. Harvey, Lucy A. Howey-Jordan, Kevin C. Weng, Bradley M. Wetherbee, Anthony D. Wood, Mahmood S. Shivji
Publikováno v:
Marine Ecology Progress Series. 547:163-175
Autor:
Steven X. Cadrin, Anthony D. Wood
Publikováno v:
anthony.wood@noaa.gov
United States National Marine Fisheries Service
United States National Marine Fisheries Service
From 2003 to 2006, 44,882 Yellowtail Flounder (Limanda ferruginea) were captured and released with conventional disc tags in the western North Atlantic as part of a cooperative Yellowtail Flounder tagging study. From these releases, 3767 of the tags
Autor:
Yafeng Wu, Anthony D. Wood, Qiuhua Cao, Lei Fang, Radu Stoleru, Zhimin He, John A. Stankovic, Thao Doan, G. Virone, Leo Selavo
Publikováno v:
IEEE Network. 22:26-33
Improving the quality of healthcare and the prospects of "aging in place" using wireless sensor technology requires solving difficult problems in scale, energy management, data access, security, and privacy. We present AlarmNet, a novel system for as
Autor:
John A. Stankovic, Anthony D. Wood
Publikováno v:
Computer. 35:54-62
Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments, helping to protect and monitor military, environmental, safety-critical, or domestic infrastructures and resources, Denial-of-service att
Publikováno v:
Monographs in Theoretical Computer Science. An EATCS Series ISBN: 9783642148484
Theoretical Aspects of Distributed Computing in Sensor Networks
Theoretical Aspects of Distributed Computing in Sensor Networks
Military surveillance, home health care or assisted living, and environmental science are three major application areas for wireless sensor networks. Revolutionary changes are possible in these application areas by using wireless sensor networks. To
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::84ff32b5bc59a32483aa07ebfe6ee8af
https://doi.org/10.1007/978-3-642-14849-1_25
https://doi.org/10.1007/978-3-642-14849-1_25
Autor:
Anthony D. Wood, John A. Stankovic
Publikováno v:
Wiley Handbook of Science and Technology for Homeland Security ISBN: 9780471761303
Wiley Handbook of Science and Technology for Homeland Security
Wiley Handbook of Science and Technology for Homeland Security
As embedded computer systems continue to explode in number and capability, security and privacy challenges abound. We review desirable security properties and the design constraints posed by these systems that make security difficult. We summarize cu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3374a02eb361ee70c8ba457d9b055953
https://doi.org/10.1002/9780470087923.hhs449
https://doi.org/10.1002/9780470087923.hhs449
Autor:
Anthony D. Wood, John A. Stankovic
Publikováno v:
Distributed Computing in Sensor Systems ISBN: 9783642020841
DCOSS
DCOSS
Bulk transport underlies data exfiltration and code update facilities in WSNs, but existing approaches are not designed for highly lossy and variable-quality links. We observe that Maymounkov's rateless online codes are asymptotically more efficient,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b91a0f5d35def3e39edfb6f13a674d1
https://doi.org/10.1007/978-3-642-02085-8_12
https://doi.org/10.1007/978-3-642-02085-8_12
Autor:
Anthony D. Wood, John A. Stankovic
Publikováno v:
SenSys
Autor:
John H. Porter, Anthony D. Wood, Woochul Kang, Yafeng Wu, Qiuhua Cao, Hengchang Liu, John A. Stankovic, Leo Selavo, A. Srinivasan, D. Young, Tamim Sookoor
Publikováno v:
SenSys
Environmental wireless sensor network (EWSN) systems are deployed in potentially harsh and remote environments where inevitable node and communication failures must be tolerated. LUSTER---Light Under Shrub Thicket for Environmental Research---is a sy
Publikováno v:
SECON
Jamming is a very effective denial-of-service attack that renders most higher-layer security mechanisms moot - yet it is often ignored in WSN design. We show that an interrupt jamming attack is simple to perpetrate in software using a MICAz mote, is