Sciweavers

789 search results - page 80 / 158
» Pushing using Compliance
Sort
View
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
16 years 2 months ago
Approximate Data Collection in Sensor Networks using Probabilistic Models
Wireless sensor networks are proving to be useful in a variety of settings. A core challenge in these networks is to minimize energy consumption. Prior database research has propo...
David Chu, Amol Deshpande, Joseph M. Hellerstein, ...
RTSS
2008
IEEE
15 years 7 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
OSDI
2008
ACM
16 years 1 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
15 years 7 months ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
ISM
2008
IEEE
163views Multimedia» more  ISM 2008»
15 years 7 months ago
Cocktail Party on the Mobile
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Kwan Hong Lee, Andrew Lippman, Thiago Santos