Sciweavers

628 search results - page 121 / 126
» Distance Field Compression
Sort
View
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 1 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
DCOSS
2006
Springer
14 years 1 months ago
Lifetime Maximization of Sensor Networks Under Connectivity and k-Coverage Constraints
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Wei Mo, Daji Qiao, Zhengdao Wang
AVI
2008
14 years 8 days ago
SyncDecor: communication appliances for virtual cohabitation
Despite the fact that various means of communication such as mobile phones, instant messenger and e-mail are now widespread; many romantic couples separated by long distances worr...
Hitomi Tsujita, Koji Tsukada, Itiro Siio
ICIA
2007
14 years 8 days ago
Effectiveness of Mobile Recommender Systems for Tourist Destinations: A User Evaluation
Mobile recommender systems have the potential to substantially enrich tourist experiences. As their handling marks a big challenge for ordinary users, its acceptance can only be e...
Marko Modsching, Ronny Kramer, Klaus ten Hagen, Ul...
AUTONOMICS
2008
ACM
13 years 12 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...