Sciweavers

3887 search results - page 574 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
150
Voted
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 4 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
EMSOFT
2010
Springer
15 years 1 months ago
Nucleos: a runtime system for ultra-compact wireless sensor nodes
Nucleos is a new runtime system for ultra-lightweight embedded systems. Central to Nucleos is a dispatcher based on the concept of e threaded code, which enables layers of abstrac...
Jiwon Hahn, Pai H. Chou
INFOCOM
2011
IEEE
14 years 6 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
IPPS
1999
IEEE
15 years 7 months ago
Application of Parallel Processors to Real-Time Sensor Array Processing
Historically, most radar sensor array processing has been implemented using dedicated and specialized processing systems. This approach was necessary because the algorithm computa...
David R. Martinez
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
15 years 1 months ago
A robust, low-cost and low-noise artificial skin for human-friendly robots
As robots and humans move towards sharing the same environment, the need for safety in robotic systems is of growing importance. Towards this goal of human-friendly robotics, a rob...
John Ulmen, Mark R. Cutkosky