Sciweavers

858 search results - page 69 / 172
» User Authentication in Sensor Networks
Sort
View
ISICT
2003
14 years 11 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
TNC
2004
103views Education» more  TNC 2004»
14 years 11 months ago
Roaming Network Access Using Shibboleth
There are activities aiming at abling users to dock to a wireless or wired network while visiting organisations outside the premises of their usual connection to the network. Thes...
Mikael Linden, Viljo Viitanen
ICDE
2009
IEEE
158views Database» more  ICDE 2009»
15 years 11 months ago
KSpot: Effectively Monitoring the K Most Important Events in a Wireless Sensor Network
This demo presents a graphical user interface and ranking system, coined KSpot, for effectively monitoring the K highest-ranked answers to a query Q in a Wireless Sensor Network. K...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, M...
IPSN
2005
Springer
15 years 3 months ago
Some sensor network elements for ubiquitous computing
— Ubiquitous computing applications often use a user's context to automatically adjust their behavior to the situation. We have developed three types of wireless sensor node...
Waylon Brunette, Jonathan Lester, Adam D. Rea, Gae...
ISWC
2002
IEEE
15 years 2 months ago
Minimal Social Weight User Interactions for Wearable Computers in Business Suits
This paper presents the e-SUIT, a wearable computer incorporated in a traditional business suit. A key feature of the system is an array of input/output devices integrated into th...
Aaron Toney, Barrie Mulley, Bruce H. Thomas, Wayne...