Sciweavers

858 search results - page 92 / 172
» User Authentication in Sensor Networks
Sort
View
NETCOOP
2009
Springer
15 years 4 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
EKAW
2008
Springer
14 years 11 months ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...
WH
2010
170views Healthcare» more  WH 2010»
14 years 4 months ago
Towards power optimized kalman filter for gait assessment using wearable sensors
Systems with wearable and wireless motion sensors have been receiving significant attention in the past few years specifically for the applications of human movement monitoring. O...
Prem Santosh Udaya Shankar, Nikhil Raveendranathan...
CJ
2010
131views more  CJ 2010»
14 years 7 months ago
Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks
an be used to abstract away from the physical reality by describing it as components that exist in discrete states with probabilistically invoked actions that change the state. The...
Duncan Gillies, David Thornley, Chatschik Bisdikia...
GLOBECOM
2010
IEEE
14 years 8 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...