Sciweavers

157 search results - page 31 / 32
» Optimizing AES for embedded devices and wireless sensor netw...
Sort
View
PERCOM
2003
ACM
14 years 5 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
INFOCOM
2010
IEEE
13 years 4 months ago
Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices—such as wireless microphones (WMs)— is a challenging, but very important, problem that has n...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
MOBISYS
2007
ACM
14 years 5 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
INFOCOM
2009
IEEE
14 years 21 days ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
CORR
2011
Springer
221views Education» more  CORR 2011»
13 years 1 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin