Ubiquitous computing architectures enable interaction and collaboration in multi-user applications. We explore the challenges of integrating the disparate services required in such...
Romain Pellerin, Nicolas Bouillot, Tatiana Pietkie...
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
We consider the problem of monitoring and controlling the position of herd animals, and view animals as agents with natural mobility but not strictly controllable. By exploiting k...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Wireless Network Interface Cards (WNICs) are part of every portable device, where efficient energy management plays a significant role in extending the device's battery life....