Sciweavers

3426 search results - page 643 / 686
» Self-identifying sensor data
Sort
View
SIGMOD
2004
ACM
153views Database» more  SIGMOD 2004»
14 years 1 months ago
Spatially-decaying aggregation over a network: model and algorithms
Data items are often associated with a location in which they are present or collected, and their relevance or in uence decays with their distance. Aggregate values over such data...
Edith Cohen, Haim Kaplan
ESAS
2004
Springer
14 years 1 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
PET
2004
Springer
14 years 1 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
ICRA
2003
IEEE
91views Robotics» more  ICRA 2003»
14 years 1 months ago
Internal posture sensing for a flexible frame modular mobile robot
- A sensor fusion algorithm for flexible framed modular mobile robots is presented in this paper. This algorithm uses traditional Kalman filters and rigid axle kinematic models to ...
Roy Merrell, Mark A. Minor
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
14 years 1 months ago
DynAHeal: Dynamic energy efficient task assignment for wireless healthcare systems
—Energy consumption is a critical parameter in wireless healthcare systems which consist of battery operated devices such as sensors and local aggregators. The system battery lif...
Priti Aghera, Dilip Krishnaswamy, Diana Fang, Ayse...