Sciweavers

1692 search results - page 311 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ICDCSW
2007
IEEE
15 years 6 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...
MOBIDE
2010
ACM
14 years 12 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...
PERVASIVE
2008
Springer
14 years 11 months ago
Rapid Prototyping of Activity Recognition Applications
The Context Recognition Network (CRN) Toolbox permits fast implementation of activity and context recognition systems. It utilizes parameterizable and reusable software components...
David Bannach, Oliver Amft, Paul Lukowicz
BSN
2009
IEEE
149views Sensor Networks» more  BSN 2009»
15 years 6 months ago
Optimizing Interval Training Protocols Using Data Mining Decision Trees
— Interval training consists of interl intensity exercises with rest periods. This training well known exercise protocol which helps stre improve one’s cardiovascular fitness. ...
Myung-kyung Suh, Mahsan Rofouei, Ani Nahapetian, W...
DIMVA
2006
15 years 1 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...