Sciweavers

5815 search results - page 1004 / 1163
» Self-monitoring for sensor networks
Sort
View
PERCOM
2008
ACM
16 years 24 days ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
PERCOM
2007
ACM
16 years 24 days ago
A Simple Model and Infrastructure for Context-Aware Browsing of the World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
PERCOM
2004
ACM
16 years 24 days ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
86
Voted
MOBISYS
2007
ACM
16 years 23 days ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
EWSN
2006
Springer
16 years 23 days ago
Generic Routing Metric and Policies for WSNs
Energy-aware algorithms have proven to be a crucial part of sensor network applications, especially if they are required to operate for extended periods of time. Among these, effic...
Olga Saukh, Pedro José Marrón, Andre...
« Prev « First page 1004 / 1163 Last » Next »