Sciweavers

1927 search results - page 275 / 386
» An Access Control Model for Location based Services
Sort
View
SAC
2009
ACM
15 years 6 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
IJRR
2008
114views more  IJRR 2008»
15 years 1 months ago
Active Electrolocation for Underwater Target Localization
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
TKDE
2008
169views more  TKDE 2008»
15 years 1 months ago
A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
Data stream management systems need to control their resources adaptively since stream characteristics and query workload may vary over time. In this paper we investigate an approa...
Michael Cammert, Jürgen Krämer, Bernhard...
JNW
2006
94views more  JNW 2006»
15 years 1 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
RTSS
2008
IEEE
15 years 8 months ago
Fast Sensor Placement Algorithms for Fusion-Based Target Detection
Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fus...
Zhaohui Yuan, Rui Tan, Guoliang Xing, Chenyang Lu,...