Sciweavers

3486 search results - page 391 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
15 years 8 months ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
148
Voted
JSAC
2008
121views more  JSAC 2008»
15 years 3 months ago
Stochastic analysis of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in disruption tolerant wireless networks, in which data can be replicated along multiple opportunistic path...
Yunfeng Lin, Baochun Li, Ben Liang
103
Voted
PERCOM
2006
ACM
16 years 3 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
123
Voted
PERCOM
2004
ACM
16 years 3 months ago
Comprehensive Structured Context Profiles (CSCP): Design and Experiences
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
Sven Buchholz, Thomas Hamann, Gerald Hübsch
142
Voted
CCR
2002
113views more  CCR 2002»
15 years 3 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...