Sciweavers

NTMS
2015
IEEE
8 years 6 months ago
Serverless lightweight mutual authentication protocol for small mobile computing devices
Small and inexpensive computing devices are becoming potential players in the Internet arena. Smart constrained devices are used for collecting or generating information which is ...
Collins Mtita, Maryline Laurent, Pascal Daragon
ALGOSENSORS
2015
Springer
8 years 6 months ago
Limitations of Current Wireless Scheduling Algorithms
We consider the problem of scheduling wireless links in the physical model, where we seek a partition of a given a set of wireless links into the minimum number of subsets satisfyi...
Magnús M. Halldórsson, Christian Kon...
ALGOSENSORS
2015
Springer
8 years 6 months ago
A Comprehensive and Lightweight Security Architecture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO
Smart objects are devices with computational and communication capabilities connected to the Internet forming the so called Internet of Things (IoT). The IoT enables many applicati...
Oscar García Morchon, Ronald Rietman, Sahil...
ALGOSENSORS
2015
Springer
8 years 6 months ago
Plane and Planarity Thresholds for Random Geometric Graphs
A random geometric graph, G(n, r), is formed by choosing n points independently and uniformly at random in a unit square; two points are connected by a straight-line edge if they a...
Ahmad Biniaz, Evangelos Kranakis, Anil Maheshwari,...
ALGOSENSORS
2015
Springer
8 years 6 months ago
Radio Aggregation Scheduling
We consider the aggregation problem in radio networks: nd a spanning tree in a given graph and a conict-free schedule of the edges so as to minimize the latency of the computatio...
Rajiv Gandhi, Magnús M. Halldórsson,...
NSPW
2015
ACM
8 years 6 months ago
WebSheets: Web Applications for Non-Programmers
Spreadsheets are a very successful programming paradigm. Their success stems from user’s familiarity with tabular data, and their previous experience in performing manual comput...
Riccardo Pelizzi, R. Sekar
NSPW
2015
ACM
8 years 6 months ago
Exploiting the Physical Environment for Securing the Internet of Things
Using the randomness provided by the physical environment to build security solutions has received much attention recently. In particular, the shared entropy provided by measuring...
Christian T. Zenger, Jan Zimmer, Mario Pietersz, J...
NSPW
2015
ACM
8 years 6 months ago
The Myth of the Average User: Improving Privacy and Security Systems through Individualization
While individual differences in decision-making have been examined within the social sciences for several decades, they have only recently begun to be applied by computer scienti...
Serge Egelman, Eyal Péer
NPAR
2015
ACM
8 years 6 months ago
Semi-automatic digital epigraphy from images with normals
We present a semi-automated system for converting photometric datasets (RGB images with normals) into geometry-aware non-photorealistic illustrations that obey the common conventi...
Sema Berkiten, Xinyi Fan, Szymon Rusinkiewicz
NOSSDAV
2015
Springer
8 years 6 months ago
Content-adaptive display power saving in internet mobile streaming
Yao Liu, Mengbai Xiao, Ming Zhang, Xin Li, Mian Do...