Sciweavers

116 search results - page 21 / 24
» Pervasive Computing with Frugal Objects
Sort
View
ICCCN
2008
IEEE
14 years 2 months ago
Energy Minimization through Network Coding for Lifetime Constrained Wireless Networks
— Energy management is the key issue in the design and operation of wireless network applications like sensor networks, pervasive computing and ubiquitous computing where the net...
Nishanth Gaddam, Sudha Anil Gathala, David Lastine...
INTERACT
2007
13 years 9 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...

Publication
819views
15 years 7 months ago
Continuous Query Processing of Spatio-temporal Data Streams in PLACE
The tremendous increase in the use of cellular phones, GPS-like devices, and RFIDs results in highly dynamic environments where objects as well as queries are continuously moving. ...
Mohamed F. Mokbel, Xiaopeng Xiong, Moustafa A. Ham...
WOWMOM
2009
ACM
180views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
OPPORTUNITY: Towards opportunistic activity and context recognition systems
Opportunistic sensing allows to efficiently collect information about the physical world and the persons behaving in it. This may mainstream human context and activity recognitio...
Daniel Roggen, Kilian Förster, Alberto Calatr...
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
13 years 11 months ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu