Sciweavers

573 search results - page 9 / 115
» Some sensor network elements for ubiquitous computing
Sort
View
93
Voted
PERCOM
2003
ACM
15 years 9 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
77
Voted
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
15 years 4 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...
96
Voted
EUC
2007
Springer
15 years 3 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
EDOC
2002
IEEE
15 years 2 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
AINA
2010
IEEE
15 years 2 months ago
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks
— We consider the problem of gathering data from a sensor network using mobile elements. In particular, we consider the case where the data are produced by measurements and need ...
Khaled Almiani, Anastasios Viglas, Lavy Libman