Sciweavers

4189 search results - page 624 / 838
» On the Security of Wireless Sensor Networks
Sort
View
GI
2004
Springer
15 years 4 months ago
Policy-Based Context-Management for Mobile Solutions
: Nowadays our world becomes more and more connected, and sensors and any kind of mobile (e.g. cell phones, PDAs) and fixed computational devices are linked together through wired...
Caroline Funk, Björn Schiemann
WWW
2008
ACM
15 years 11 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
15 years 5 months ago
HybridExploration: A distributed approach to terrain exploration using mobile and fixed sensor nodes
— When an emergency occurs within a building, it may be initially safer to send autonomous mobile nodes, instead of human responders, to explore the area and identify hazards and...
Ettore Ferranti, Niki Trigoni, Mark Levene
90
Voted
SASO
2007
IEEE
15 years 5 months ago
Desynchronization: The Theory of Self-Organizing Algorithms for Round-Robin Scheduling
The study of synchronization has received much attention in a variety of applications, ranging from coordinating sensors in wireless networks to models of fireflies flashing in...
Ankit Patel, Julius Degesys, Radhika Nagpal
GISCIENCE
2008
Springer
112views GIS» more  GISCIENCE 2008»
15 years 3 days ago
Decentralized Movement Pattern Detection amongst Mobile Geosensor Nodes
Movement patterns, like flocking and converging, leading and following, are examples of high-level process knowledge derived from lowlevel trajectory data. Conventional techniques...
Patrick Laube, Matt Duckham, Thomas Wolle