Sciweavers

4189 search results - page 786 / 838
» On the Security of Wireless Sensor Networks
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Gossip algorithms: design, analysis and applications
Abstract— Motivated by applications to sensor, peer-topeer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and...
Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, D...
ETFA
2008
IEEE
14 years 4 months ago
CoReDac: Collision-free command-response data collection
Most of the existing sensor network deployments are convergecast data collection applications that transmit data from multiple sources to a sink. In this paper, we present CoReDac...
Thiemo Voigt, Fredrik Österlind
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
14 years 4 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...
ICDCSW
2005
IEEE
14 years 3 months ago
Adding Context Information to Digital Photos
In a user centered design process, we investigate what context information may be used to augment digital photos with additional meta information. We describe our initial findings...
Paul Holleis, Matthias Kranz, Marion Gall, Albrech...
KES
2005
Springer
14 years 3 months ago
Reconfigurable Power-Aware Scalable Booth Multiplier
Abstract. An energy-efficient power-aware design is highly desirable for digital signal processing functions that encounter a wide diversity of operating scenarios in battery-power...
Hanho Lee