Sciweavers

858 search results - page 97 / 172
» User Authentication in Sensor Networks
Sort
View
PEWASUN
2007
ACM
14 years 11 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
DMSN
2009
ACM
15 years 4 months ago
FSort: external sorting on flash-based sensor devices
In long-term deployments of Wireless Sensor Networks, it is often more efficient to store sensor readings locally at each device and transmit those readings to the user only when ...
Panayiotis Andreou, Orestis Spanos, Demetrios Zein...
SASN
2003
ACM
15 years 3 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
BSN
2006
IEEE
15 years 1 months ago
eWatch: A Wearable Sensor and Notification Platform
The eWatch is a wearable sensing, notification, and computing platform built into a wrist watch form factor making it highly available, instantly viewable, ideally located for sen...
Uwe Maurer, Anthony Rowe, Asim Smailagic, Daniel P...
CHI
2005
ACM
15 years 10 months ago
The future of user interface design tools
This workshop aims to gather researchers in the field of user interface design tools to identify important themes for the next decade of research. These tools aid in the design an...
Dan R. Olsen, Scott R. Klemmer