Sciweavers

858 search results - page 85 / 172
» User Authentication in Sensor Networks
Sort
View
PERCOM
2011
ACM
14 years 1 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
AINA
2008
IEEE
15 years 4 months ago
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination
In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predict...
Koichi Miyashita, Tsutomu Terada, Shojiro Nishio
PERCOM
2004
ACM
15 years 9 months ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 4 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
BSN
2006
IEEE
15 years 4 months ago
An Ecosystem of Platforms to Support Sensors for Personal Fitness
We have developed a collection of portable platforms to enable context-aware applications to help users with their personal fitness. Our approach has been to focus on established ...
Gaetano Borriello, Waylon Brunette, Jonathan Leste...