Sciweavers

504 search results - page 55 / 101
» Computation in networks of passively mobile finite-state sen...
Sort
View
PERCOM
2008
ACM
15 years 11 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
MOBISYS
2010
ACM
15 years 2 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
AUTOMATICA
2010
99views more  AUTOMATICA 2010»
14 years 12 months ago
Continuous trajectory planning of mobile sensors for informative forecasting
This paper addresses planning of continuous paths for mobile sensors to reduce uncertainty in some quantities of interest in the future. The mutual information between the measure...
Han-Lim Choi, Jonathan P. How
ICDCS
2007
IEEE
15 years 6 months ago
A Virtual Node-Based Tracking Algorithm for Mobile Networks
— We introduce a virtual-node based mobile object tracking algorithm for mobile sensor networks, VINESTALK. The algorithm uses the Virtual Stationary Automata programming layer, ...
Tina Nolte, Nancy A. Lynch
GI
2004
Springer
15 years 5 months ago
Policy-Based Context-Management for Mobile Solutions
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
Caroline Funk, Björn Schiemann