131
click to vote
SUTC
15 years 7 months ago
2008 IEEE
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
119
click to vote
DMSN
15 years 3 months ago
2008 ACM
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
121
click to vote
ALGOSENSORS
15 years 3 months ago
2008 Springer
In this paper, we re-examine the RSSI measurement model for location estimation and provide the first detailed formulation of the probability distribution of the position of a sens...
118
click to vote
SUTC
15 years 7 months ago
2008 IEEE
: The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This ...
119
click to vote
SUTC
15 years 7 months ago
2008 IEEE
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose ...
|