Sciweavers

10044 search results - page 1844 / 2009
» Authentication in Wireless Networks
Sort
View
157
Voted
CSE
2009
IEEE
15 years 6 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
180
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
131
Voted
ICASSP
2010
IEEE
15 years 5 months ago
Convergence analysis of consensus-based distributed clustering
This paper deals with clustering of spatially distributed data using wireless sensor networks. A distributed low-complexity clustering algorithm is developed that requires one-hop...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
117
Voted
ICASSP
2010
IEEE
15 years 5 months ago
A survey of implementation efforts and experimental design for cooperative communications
Design and analysis of cooperative communication schemes based upon modeling and simulation exist in large quantities in the research literature. Despite this fact, there have bee...
Glenn Bradford, J. Nicholas Laneman
156
Voted
AHS
2007
IEEE
202views Hardware» more  AHS 2007»
15 years 5 months ago
PERPLEXUS: Pervasive Computing Framework for Modeling Complex Virtually-Unbounded Systems
This paper introduces Perplexus, a European project that aims to develop a scalable hardware platform made of custom reconfigurable devices endowed with bio-inspired capabilities...
Eduardo Sanchez, Andrés Pérez-Uribe,...
« Prev « First page 1844 / 2009 Last » Next »