124
Voted
SUTC
15 years 6 months ago
2008 IEEE
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
107
click to vote
DMSN
15 years 2 months ago
2008 ACM
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
115
Voted
ALGOSENSORS
15 years 2 months ago
2008 Springer
In this paper, we re-examine the RSSI measurement model for location estimation and provide the first detailed formulation of the probability distribution of the position of a sens...
112
Voted
SUTC
15 years 6 months ago
2008 IEEE
: The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This ...
115
Voted
SUTC
15 years 6 months ago
2008 IEEE
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose ...
|