Sciweavers

858 search results - page 70 / 172
» User Authentication in Sensor Networks
Sort
View
DCOSS
2009
Springer
15 years 4 months ago
Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proposed for a large variety of applications. As the number of applications of sensor networks continue to grow, the number of users in se...
Hui Ling, Taieb Znati
UM
2010
Springer
15 years 3 months ago
Twitter, Sensors and UI: Robust Context Modeling for Interruption Management
In this paper, we present the results of a two-month field study of fifteen people using a software tool designed to model changes in a user’s availability. The software uses s...
Justin Tang, Donald J. Patterson
83
Voted
HCI
2007
14 years 11 months ago
Sensor-Driven Adaptation of Web Document Presentation
The increasing variety of user device technologies has raised the necessity for ubiquitous content provision, which is characterized by “intelligent” content delivery to end us...
Spyros Nathanail, Vassileios Tsetsos, Stathes Hadj...
WMASH
2005
ACM
15 years 3 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
CSE
2009
IEEE
15 years 4 months ago
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML
1 Mobile sensor nodes should be well deployed so that they maximize the area coverage with the constraint that each node has at least K neighbours, where K is a userspecified para...
Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-He...