Sciweavers

1087 search results - page 167 / 218
» Secure Tracking in Sensor Networks
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
ICDCSW
2007
IEEE
15 years 4 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
PUC
2002
143views more  PUC 2002»
14 years 9 months ago
TRIP: A Low-Cost Vision-Based Location System for Ubiquitous Computing
: Sentient Computing provides computers with perception so that they can react and provide assistance to user activities. Physical spaces are made sentient when they are wired with...
Diego López de Ipiña, Paulo R. S. Me...
JSAC
2010
147views more  JSAC 2010»
14 years 8 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
TDSC
2010
102views more  TDSC 2010»
14 years 8 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia