Sciweavers

97 search results - page 3 / 20
» On the Design and Use of Internet Sinks for Network Abuse Mo...
Sort
View
PERCOM
2010
ACM
13 years 4 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...
PERCOM
2008
ACM
13 years 5 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
SAINT
2008
IEEE
13 years 12 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal
CEAS
2005
Springer
13 years 7 months ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
INFOCOM
2007
IEEE
13 years 12 months ago
Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes
Abstract—It may not be feasible for sensor networks monitoring nature and inaccessible geographical regions to include powered sinks with Internet connections. We consider the sc...
Yunfeng Lin, Ben Liang, Baochun Li