Sciweavers

16 search results - page 2 / 4
» Decentralized Bootstrapping in Pervasive Applications
Sort
View
ICASSP
2010
IEEE
13 years 5 months ago
Particle filter adaptation for distributed sensors via set membership
A distributed set-membership-constrained particle filter (SMCPF) is developed for decentralized tracking applications using wireless sensor networks. Unlike existing PF alternati...
Shahrokh Farahmand, Stergios I. Roumeliotis, Georg...
PERCOM
2008
ACM
14 years 4 months ago
Structured decomposition of adaptive applications
We describe an approach to automate certain highlevel implementation decisions in a pervasive application, allowing them to be postponed until run time. Our system enables a model...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Gr...
ICAC
2005
IEEE
13 years 10 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
CN
2007
172views more  CN 2007»
13 years 5 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 9 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...