Sciweavers

858 search results - page 93 / 172
» User Authentication in Sensor Networks
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
CORR
2006
Springer
97views Education» more  CORR 2006»
14 years 10 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
14 years 8 months ago
Towards optimally efficient field estimation with threshold-based pruning in real robotic sensor networks
Abstract-- The efficiency of distributed sensor networks depends on an optimal trade-off between the usage of resources and data quality. The work in this paper addresses the probl...
Amanda Prorok, Christopher M. Cianci, Alcherio Mar...
MMNS
2003
199views Multimedia» more  MMNS 2003»
14 years 11 months ago
BeanWatcher: A Tool to Generate Multimedia Monitoring Applications for Wireless Sensor Networks
In this paper we present a new tool called BeanWatcher that allows the semi-automatic generation of multimedia monitoring and management applications for wireless sensor networks. ...
André Lins, Eduardo Freire Nakamura, Antoni...
PERCOM
2009
ACM
15 years 4 months ago
Opening Pervasive Computing to the Masses Using the SEAP Middleware
— The increasing availability of sensing devices has made the possibility of context-aware pervasive computing applications real. However, constructing this software requires ext...
Seth Holloway, Drew Stovall, Jorge Lara-Garduno, C...