Sciweavers

4984 search results - page 879 / 997
» Network-Assisted Wireless Computing
Sort
View
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 8 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
112
Voted
ICASSP
2008
IEEE
15 years 8 months ago
Optimized distributed 2D transforms for irregularly sampled sensor network grids using wavelet lifting
We address the design and optimization of an energy-efficient lifting-based 2D transform for wireless sensor networks with irregular spatial sampling. The 2D transform is designe...
Godwin Shen, Antonio Ortega
INFOCOM
2008
IEEE
15 years 8 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
112
Voted
RAM
2008
IEEE
137views Robotics» more  RAM 2008»
15 years 8 months ago
Middleware for Robotics: A Survey
—The field of robotics relies heavily on various technologies such as mechatronics, computing systems, and wireless communication. Given the fast growing technological progress i...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar
SSDBM
2008
IEEE
101views Database» more  SSDBM 2008»
15 years 8 months ago
Scalable Ubiquitous Data Access in Clustered Sensor Networks
Wireless sensor networks have drawn much attention due to their ability to monitor ecosystems and wildlife habitats. In such systems, the data should be intelligently collected to ...
Yueh-Hua Lee, Alex Thomo, Kui Wu, Valerie King