Sciweavers

858 search results - page 94 / 172
» User Authentication in Sensor Networks
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
ESWS
2010
Springer
15 years 2 months ago
Semantics, Sensors, and the Social Web: The Live Social Semantics Experiments
Abstract. The Live Social Semantics is an innovative application that encourages and guides social networking between researchers at conferences and similar events. The application...
Martin Szomszor, Ciro Cattuto, Wouter Van den Broe...
SENSYS
2003
ACM
15 years 3 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal
SIGGRAPH
1993
ACM
15 years 2 months ago
Sensor-actuator networks
Sensor-actuator networks (SANs) are a new approach for the physically-based animation of objects. The user supplies the configuratíon of a mechanical system that hás been augmen...
Michiel van de Panne
GI
2004
Springer
15 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner