Sciweavers

4189 search results - page 770 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ICDCSW
2003
IEEE
14 years 3 months ago
Broadcast Data Organizations and Client Side Cache
Broadcasting provides an e cient means for disseminating information in both wired and wireless setting. In this paper, we study di erent client side cache organizations for vario...
Oleg Shigiltchoff, Panos K. Chrysanthis, Evaggelia...
ISWC
2002
IEEE
14 years 3 months ago
Minimal Social Weight User Interactions for Wearable Computers in Business Suits
This paper presents the e-SUIT, a wearable computer incorporated in a traditional business suit. A key feature of the system is an array of input/output devices integrated into th...
Aaron Toney, Barrie Mulley, Bruce H. Thomas, Wayne...
ICWE
2010
Springer
13 years 8 months ago
Mashing Up Your Web-Enabled Home
Many efforts are currently going towards networking smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rat...
Dominique Guinard
COMPSYSTECH
2009
13 years 8 months ago
Architectural models for realization of web-based personal health systems
: Recent advances in Information and Communication Technologies (ICT) and more specifically in wireless networks and mobile computing have driven new directions in the development ...
Mitko Shopov, Grisha Spasov, Galidia Petrova
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 10 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi