124
Voted
SUTC
15 years 6 months ago
2008 IEEE
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
112
Voted
SUTC
15 years 6 months ago
2008 IEEE
: The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This ...
115
Voted
SUTC
15 years 6 months ago
2008 IEEE
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose ...
110
click to vote
SUTC
15 years 6 months ago
2008 IEEE
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
118
Voted
SUTC
15 years 6 months ago
2008 IEEE
— In this paper we discuss the design methodology based on the service-oriented architecture and agile development principles for wireless embedded and sensor networks (WSNs). Th...
|