Sciweavers

PERCOM
2007
ACM
14 years 4 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
PERCOM
2007
ACM
14 years 4 months ago
Energy-Aware Tag Anti-Collision Protocols for RFID Systems
Energy consumption of mobile readers is becoming an important issue as applications of RFID systems pervade different aspects of our lives. Surprisingly, however, these systems ar...
Vinod Namboodiri, Lixin Gao
PERCOM
2007
ACM
14 years 4 months ago
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
In this paper we investigate the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate ...
Jian Li, Prasant Mohapatra
PERCOM
2007
ACM
14 years 4 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...
PERCOM
2007
ACM
14 years 4 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
PERCOM
2007
ACM
14 years 4 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
PERCOM
2007
ACM
14 years 4 months ago
Middleware for pervasive computing
Mohan Kumar, Franco Zambonelli
PERCOM
2007
ACM
14 years 4 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
PERCOM
2007
ACM
14 years 4 months ago
MundoCore: A light-weight infrastructure for pervasive computing
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing. To address the high degree of heterogeneity of platforms and networking ...
Erwin Aitenbichler, Jussi Kangasharju, Max MühlhÃ...
PERCOM
2007
ACM
14 years 4 months ago
How smart are our environments? An updated look at the state of the art
In this paper we take a look at the start of the art in smart environments research. The survey is motivated by the recent dramatic increase of activity in the field, and summariz...
Diane J. Cook, Sajal K. Das