Sciweavers

858 search results - page 118 / 172
» User Authentication in Sensor Networks
Sort
View
ICDCS
2006
IEEE
15 years 4 months ago
Greedy is Good: On Service Tree Placement for In-Network Stream Processing
This paper is concerned with reducing communication costs when executing distributed user tasks in a sensor network. We take a service-oriented abstraction of sensor networks, whe...
Zoë Abrams, Jie Liu
DCOSS
2008
Springer
14 years 11 months ago
Automatic Collection of Fuel Prices from a Network of Mobile Cameras
Abstract. It is an undeniable fact that people want information. Unfortunately, even in today's highly automated society, a lot of the information we desire is still manually ...
Y. F. Dong, Salil S. Kanhere, Chun Tung Chou, Niru...
PERCOM
2008
ACM
14 years 10 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
PERCOM
2009
ACM
15 years 10 months ago
iLamp: A Sensor-Enhanced Lamp with Surface-Tracking Capability Based on Light Intensity
The iLamp1 system is a sensor-enhanced desk lamp with surface-tracking capability based on received light intensity. It consists of two components: lamp and bookmark. The bookmark ...
Lun-Wu Yeh, Che-Yen Lu, Yu-Hsuan Lin, Jia-Liang Li...
EDBT
2008
ACM
125views Database» more  EDBT 2008»
15 years 10 months ago
On the brink: searching for drops in sensor data
Sensor networks have been widely used to collect data about the environment. When analyzing data from these systems, people tend to ask exploratory questions--they want to find su...
Gong Chen, Junghoo Cho, Mark H. Hansen