Sciweavers

Share
PERCOM
2005
ACM
10 years 2 months ago
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
Security in wireless sensor networks is currently provided exclusively through symmetric key cryptography. In this paper we show that special purpose ultra-low power hardware impl...
Berk Sunar, Erdinç Öztürk, Gunnar...
PERCOM
2005
ACM
10 years 2 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...
PERCOM
2005
ACM
10 years 2 months ago
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy, capacity and computatio...
Márk Félegyházi, Jean-Pierre ...
PERCOM
2005
ACM
10 years 2 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
PERCOM
2005
ACM
10 years 2 months ago
Maneuverable Relays to Improve Energy Efficiency in Sensor Networks
We propose a hybrid model to alleviate the notorious problem of premature battery depletion in sensor networks: in a first stage, simple sensors are deployed over an area of inter...
Stephan Eidenbenz, Lukas Kroc, James P. Smith
PERCOM
2005
ACM
10 years 2 months ago
The Area Graph-Based Mobility Model and Its Impact on Data Dissemination
When analyzing dissemination protocols in mobile adhoc networks the underlying mobility model is an important factor because it strongly influences the performance of these protoc...
Sven Bittner, Wolf-Ulrich Raffel, Manuel Scholz
PERCOM
2005
ACM
10 years 2 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
PERCOM
2005
ACM
10 years 2 months ago
Modeling Context-Aware e-Learning Scenarios
In the last decade, e-learning has been introduced to a variety of blended learning scenarios, such as life-long learning, University lectures, and game-based learning. In all the...
Michael Derntl, Karin Anna Hummel
PERCOM
2005
ACM
10 years 2 months ago
Media Distribution in a Pervasive Computing Environment
Distribution of media in the fast growing world of digital stored content and multimedia supporting devices with connectivity, calls for a new media distribution architecture. The...
Winfried A. H. Berkvens, Arjan Claassen, Joep P. v...
PERCOM
2005
ACM
10 years 2 months ago
REDMAN: A Decentralized Middleware Solution for Cooperative Replication in Dense MANETs
The mass market of wireless devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as university campuses,...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
books