Sciweavers

1487 search results - page 251 / 298
» Information assurance in sensor networks
Sort
View
MKWI
2008
156views Business» more  MKWI 2008»
15 years 3 months ago
Enabling Open Innovation in a World of Ubiquitous Computing - Proposing a Research Agenda
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
MOBISYS
2005
ACM
16 years 1 months ago
Turducken: hierarchical power management for mobile devices
Abstract-Maintaining optimal consistency in a distributed system requires that nodes be always-on to synchronize information. Unfortunately, mobile devices such as laptops do not h...
Jacob Sorber, Nilanjan Banerjee, Mark D. Corner, S...
BSN
2009
IEEE
160views Sensor Networks» more  BSN 2009»
15 years 8 months ago
BSN Simulator: Optimizing Application Using System Level Simulation
—A biomonitoring application running on wireless BAN has stringent timing and energy requirements. Developing such applications therefore presents unique challenges in both hardw...
Ioana Cutcutache, Thi Thanh Nga Dang, Wai Kay Leon...
SUTC
2008
IEEE
15 years 8 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
EUROSSC
2007
Springer
15 years 8 months ago
Recognition of User Activity Sequences Using Distributed Event Detection
We describe and evaluate a distributed architecture for the online recognition of user activity sequences. In a lower layer, simple heterogeneous atomic activities were recognised ...
Oliver Amft, Clemens Lombriser, Thomas Stiefmeier,...