Sciweavers

2362 search results - page 397 / 473
» The wireless network jamming problem
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Modelling and Using Imperfect Context Information
Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
Karen Henricksen, Jadwiga Indulska
MOBIHOC
2004
ACM
16 years 4 months ago
Locating cache proxies in manets
Caching Internet based services is a potentially important application for MANETs, as it can improve mobile users' perceived quality of service, reduce their energy consumpti...
Roy Friedman, Maria Gradinariu, Gwendal Simon
PERCOM
2009
ACM
15 years 11 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
PERCOM
2009
ACM
15 years 11 months ago
Using Situation Lattices in Sensor Analysis
Highly sensorised systems present two parallel challenges: how to design a sensor suite that can efficiently and cost-effectively support the needs of given services; and to extr...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
HYBRID
2009
Springer
15 years 11 months ago
On Event Based State Estimation
To reduce the amount of data transfer in networked control systems and wireless sensor networks, measurements are usually taken only when an event occurs, rather than at each synch...
Joris Sijs, Mircea Lazar