Sciweavers

3971 search results - page 728 / 795
» Firewalling wireless sensor networks: Security by wireless
Sort
View
MOBICOM
1996
ACM
14 years 2 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
TWC
2008
201views more  TWC 2008»
13 years 10 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
AINA
2007
IEEE
14 years 4 months ago
An Adaptive Localized Algorithm for Multiple Sensor Area Coverage
— Wireless sensor networks are made up of hundreds of devices deployed over a distant or sensitive field to be monitored. Energy consumption is balanced by taking advantage of t...
Antoine Gallais, Jean Carle
EWSN
2008
Springer
14 years 10 months ago
Characterizing Mote Performance: A Vector-Based Methodology
Sensors networks instrument the physical space using motes that run network embedded programs thus acquiring, processing, storing and transmitting sensor data. The motes commercial...
Martin Leopold, Marcus Chang, Philippe Bonnet
EUROSSC
2007
Springer
14 years 4 months ago
Inferring and Distributing Spatial Context
An increasing number of computationally enhanced objects is distributed around us in physical space, which are equipped – or at least can be provided – with sensors for measuri...
Clemens Holzmann