Sciweavers

1325 search results - page 206 / 265
» Exploring sensor networks using mobile agents
Sort
View
GLOBECOM
2010
IEEE
14 years 9 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
ISMAR
2003
IEEE
15 years 4 months ago
ID CAM: A Smart Camera for Scene Capturing and ID Recognition
An ID recognition system is described that uses optical beacons and a high-speed image sensor. The ID sensor captures a scene like an ordinary camera and recognizes the ID of a be...
Nobuyuki Matsushita, Daisuke Hihara, Teruyuki Ushi...
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
15 years 4 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
ICRA
2009
IEEE
127views Robotics» more  ICRA 2009»
15 years 5 months ago
Relative bearing estimation from commodity radios
— Relative bearing between robots is important in applications like pursuit-evasion [11] and SLAM [7]. This is also true in in sensor networks, where the bearing of one sensor no...
Karthik Dantu, Prakhar Goyal, Gaurav S. Sukhatme
SAC
2010
ACM
15 years 6 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...