Abstract-- As the distance between terminals in modern wireless networks tends to decrease, the energy consumption issue, conventionally assumed to be exclusively dominated by the ...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
—Efficient information management is crucial for the timely administration of Emergency Medical Services (EMS). In this paper, we describe a project to design and implement an au...
Brian R. L'Heureux, Michael J. McHugh, Benjamin D....