Sciweavers

3887 search results - page 683 / 778
» Sensor Network Localization Using Sensor Perturbation
Sort
View
PERCOM
2009
ACM
15 years 9 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
SAINT
2008
IEEE
15 years 8 months ago
Accuracy-Based Cache Consistency Management for Numerical Object Replication
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
Hideya Ochiai, Hiroshi Esaki
AINA
2007
IEEE
15 years 8 months ago
Deployment of Services-Oriented Applications Integrating Physical and IT Systems
A broad range of industries must be able to seamlessly integrate control applications using sensors distributed in the real world and IT applications supporting various business a...
Antonin Chazalet, Philippe Lalanda
107
Voted
MSN
2005
Springer
15 years 8 months ago
A Low Overhead Ad Hoc Routing Protocol with Route Recovery
Many routing protocols have been designed for Ad Hoc networks. However, most of these kinds of protocols are not able to react fast enough to maintain routing. In the paper, we pro...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Po Tsa...
108
Voted
ISWC
2002
IEEE
15 years 7 months ago
Minimal Social Weight User Interactions for Wearable Computers in Business Suits
This paper presents the e-SUIT, a wearable computer incorporated in a traditional business suit. A key feature of the system is an array of input/output devices integrated into th...
Aaron Toney, Barrie Mulley, Bruce H. Thomas, Wayne...