Sciweavers

924 search results - page 166 / 185
» Heuristics for Network Coding in Wireless Networks
Sort
View
ESAS
2004
Springer
15 years 3 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
SECON
2008
IEEE
15 years 4 months ago
UDAE: Universal Data Access Engine for Sensor Networks
—We present the design and implementation of UDAE, a Universal Data Access Engine for wireless sensor networks. The UDAE allows developers to access data both locally and over th...
Krisakorn Rerkrai, Janne Riihijärvi, Petri M&...
PERCOM
2007
ACM
15 years 9 months ago
A Context Middleware Based on Sensor and RFID Information
Pervasive computing environments have traditionally used distributed sensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could addit...
Daeyoung Kim, Tomás Sánchez Ló...
PERCOM
2003
ACM
15 years 9 months ago
Self-Routing in Pervasive Computing Environments Using Smart Messages
Smart Messages (SMs) are dynamic collections of code and data that migrate to nodes of interest in the network and execute on these nodes. A key challenge in programming pervasive...
Cristian Borcea, Chalermek Intanagonwiwat, Akhiles...
PERCOM
2009
ACM
15 years 4 months ago
A High-Performance Remote Computing Platform
— The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a highper...
Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li