Sciweavers

1357 search results - page 233 / 272
» Security in Wireless Sensor Networks: Issues and Challenges
Sort
View
JCST
2010
119views more  JCST 2010»
13 years 7 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
ICDCS
2008
IEEE
14 years 3 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu
TPDS
2010
86views more  TPDS 2010»
13 years 7 months ago
Quality of Trilateration: Confidence-Based Iterative Localization
The proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multilateration, as a bas...
Zheng Yang, Yunhao Liu
IEEESCC
2007
IEEE
14 years 3 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
CSE
2009
IEEE
14 years 3 months ago
The Importance of Data Collection for Modelling Contact Networks
—The recently developed small wireless devices ranging from sensor boards to mobile phones provide a timely opportunity to gather unique data sets on complex human interactions, ...
Eiko Yoneki