Sciweavers

124
Voted
SUTC
2008
IEEE
15 years 6 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
DMSN
2008
ACM
15 years 2 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
115
Voted
ALGOSENSORS
2008
Springer
15 years 2 months ago
Algorithms for Location Estimation Based on RSSI Sampling
In this paper, we re-examine the RSSI measurement model for location estimation and provide the first detailed formulation of the probability distribution of the position of a sens...
Charalampos Papamanthou, Franco P. Preparata, Robe...
112
Voted
SUTC
2008
IEEE
15 years 6 months ago
Cyber-Physical Systems: A New Frontier
: The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This ...
Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wa...
115
Voted
SUTC
2008
IEEE
15 years 6 months ago
Power-Aware Real-Time Scheduling upon Identical Multiprocessor Platforms
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose ...
Vincent Nélis, Joël Goossens, Raymond ...
Sensor Networks
Top of PageReset Settings