Sciweavers

2032 search results - page 391 / 407
» Application Development in Vision-Enabled Wireless Sensor Ne...
Sort
View
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
14 years 1 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
Fundamental Limits of Wideband Localization - Part I: A General Framework
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...
Yuan Shen, Moe Z. Win
CCS
2006
ACM
14 years 10 days ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
MOBISYS
2010
ACM
13 years 11 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
ICNP
2006
IEEE
14 years 2 months ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora