Sciweavers

858 search results - page 82 / 172
» User Authentication in Sensor Networks
Sort
View
WINET
2002
166views more  WINET 2002»
14 years 9 months ago
The Anatomy of a Context-Aware Application
We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for rich...
Andy Harter, Andy Hopper, Pete Steggles, Andy Ward...
ICIP
2007
IEEE
15 years 11 months ago
Lifetime-Distortion Trade-off in Image Sensor Networks
We examine the trade-off between lifetime and distortion in image sensor networks deployed for gathering visual information over a monitored region. Users navigate over the monito...
Chao Yu, Stanislava Soro, Gaurav Sharma, Wendi Rab...
IEEEMSP
2002
IEEE
166views Multimedia» more  IEEEMSP 2002»
15 years 2 months ago
Medium access control with channel state information for large sensor networks
Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...
Srihari Adireddy, Lang Tong
MOBIMEDIA
2007
14 years 11 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
CHI
2010
ACM
15 years 3 months ago
Hand in hand with the material: designing for suppleness
Designing for a supple interaction, involving users bodily and emotionally into a ‘dance’ with a system is a challenging task. Any break-ups in interaction become fatal to the...
Petra Sundström, Kristina Höök