Sciweavers

1051 search results - page 146 / 211
» Secure Continuity for Sensor Networks
Sort
View
BSN
2009
IEEE
118views Sensor Networks» more  BSN 2009»
15 years 11 months ago
Smart Jacket Design for Neonatal Monitoring with Wearable Sensors
— Critically ill new born babies admitted at the Neonatal Intensive Care Unit (NICU) are extremely tiny and vulnerable to external disturbance. Smart Jacket proposed in this pape...
Sibrecht Bouwstra, Wei Chen, Loe M. G. Feijs, Sida...
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
129
Voted
VLDB
2005
ACM
110views Database» more  VLDB 2005»
15 years 9 months ago
U-DBMS: A Database System for Managing Constantly-Evolving Data
In many systems, sensors are used to acquire information from external environments such as temperature, pressure and locations. Due to continuous changes in these values, and lim...
Reynold Cheng, Sarvjeet Singh, Sunil Prabhakar
EDBT
2004
ACM
187views Database» more  EDBT 2004»
16 years 4 months ago
Hierarchical In-Network Data Aggregation with Quality Guarantees
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
INFOCOM
2010
IEEE
15 years 2 months ago
Pattern Mutation in Wireless Sensor Deployment
—In this paper, we study the optimal deployment pattern problem in wireless sensor networks (WSNs). We propose a new set of patterns, particularly when sensors’ communication r...
Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia, Wei ...