Sciweavers

1081 search results - page 54 / 217
» Challenges: an application model for pervasive computing
Sort
View
ISCAS
2007
IEEE
152views Hardware» more  ISCAS 2007»
15 years 10 months ago
Reduced Complexity Space-Time-Frequency Model for Multi-Channel EEG and Its Applications
— Searching for an efficient summarization of multi-channel electroencephalogram (EEG) behavior is a challenging signal analysis problem. Recently, parallel factor analysis (PAR...
Yodchanan Wongsawat, Soontorn Oraintara, K. R. Rao
PERCOM
2010
ACM
15 years 8 months ago
Orchestrator: An active resource orchestration framework for mobile context monitoring in sensor-rich mobile environments
— In this paper, we present Orchestrator, an active resource orchestration framework for mobile context monitoring. Emerging pervasive environments will introduce a PAN-scale sen...
Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyu...
TMC
2010
124views more  TMC 2010»
15 years 2 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...
128
Voted
PERVASIVE
2009
Springer
15 years 11 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
WOSP
2004
ACM
15 years 9 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...