Sciweavers

17932 search results - page 3389 / 3587
» Wireless communications systems
Sort
View
ISPEC
2010
Springer
15 years 2 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
121
Voted
CRITICAL
2005
15 years 2 months ago
Palpable time for heterogeneous care communities
This paper describes an ongoing design experience conducted in the Neonatal Intensive Care Unit for Premature Newborns. The specificity and the delicateness of such a setting prov...
Erik Grönvall, Patrizia Marti, Alessandro Pol...
106
Voted
DMSN
2005
ACM
15 years 2 months ago
Zone sharing: a hot-spots decomposition scheme for data-centric storage in sensor networks
In the resource over-constrained environment of sensor networks, techniques for storing data locally in sensor nodes have been proposed to support efficient processing of adhoc qu...
Mohamed Aly, Nicholas Morsillo, Panos K. Chrysanth...
DMSN
2005
ACM
15 years 2 months ago
The threshold join algorithm for top-k queries in distributed sensor networks
In this paper we present the Threshold Join Algorithm (TJA), which is an efficient TOP-k query processing algorithm for distributed sensor networks. The objective of a top-k query...
Demetrios Zeinalipour-Yazti, Zografoula Vagena, Di...
88
Voted
CSCW
2008
ACM
15 years 2 months ago
Minimum movement matters: impact of robot-mounted cameras on social telepresence
Recently, various robots capable of having a video chat with distant people have become commercially available. This paper shows that movement of these robots enhances distant peo...
Hideyuki Nakanishi, Yuki Murakami, Daisuke Nogami,...
« Prev « First page 3389 / 3587 Last » Next »