Sciweavers

2268 search results - page 430 / 454
» Modeling wireless shadow networks
Sort
View
GLOBECOM
2007
IEEE
15 years 8 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
KBSE
2007
IEEE
15 years 8 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
SSD
2005
Springer
93views Database» more  SSD 2005»
15 years 7 months ago
Semantic Caching for Multiresolution Spatial Query Processing in Mobile Environments
Spatial data are particularly useful in mobile environments. However, due to the low bandwidth of most wireless networks, developing large spatial database applications becomes a c...
Sai Sun, Xiaofang Zhou, Heng Tao Shen
133
Voted
DCOSS
2005
Springer
15 years 7 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan
152
Voted
DSRT
2003
IEEE
15 years 7 months ago
Real Time Inspection of Hidden Worlds
“Smart Things” are commonly understood as wireless ad-hoc networked, mobile, autonomous, special purpose computing appliances, usually interacting with their environment impli...
Alois Ferscha, Markus Keller