Sciweavers

858 search results - page 88 / 172
» User Authentication in Sensor Networks
Sort
View
MUE
2007
IEEE
100views Multimedia» more  MUE 2007»
15 years 4 months ago
Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core Network
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...
DMSN
2005
ACM
14 years 12 months ago
The threshold join algorithm for top-k queries in distributed sensor networks
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Demetrios Zeinalipour-Yazti, Zografoula Vagena, Di...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...
ISPAN
2005
IEEE
15 years 3 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 4 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He