Sciweavers

5699 search results - page 1093 / 1140
» Applications of Wireless Sensor Networks
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
14 years 9 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
TMC
2010
158views more  TMC 2010»
14 years 8 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
SASN
2003
ACM
15 years 3 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
MOBISYS
2007
ACM
15 years 9 months ago
MobiUS: enable together-viewing video experience across two mobile devices
We envision a new better-together mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific together-viewing video application...
Guobin Shen, Yanlin Li, Yongguang Zhang
OTM
2007
Springer
15 years 3 months ago
A Bluetooth-Based JXME Infrastructure
Abstract. Over the last years, research efforts have led the way to embed computation into the environment. Much attention is drawn to technologies supporting dynamicity and mobil...
Carlo Blundo, Emiliano De Cristofaro
« Prev « First page 1093 / 1140 Last » Next »