Sciweavers

573 search results - page 9 / 115
» Some sensor network elements for ubiquitous computing
Sort
View
103
Voted
PERCOM
2003
ACM
15 years 11 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
93
Voted
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
15 years 6 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...
112
Voted
EUC
2007
Springer
15 years 5 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
EDOC
2002
IEEE
15 years 4 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
98
Voted
AINA
2010
IEEE
15 years 4 months ago
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks
— We consider the problem of gathering data from a sensor network using mobile elements. In particular, we consider the case where the data are produced by measurements and need ...
Khaled Almiani, Anastasios Viglas, Lavy Libman