Sciweavers

867 search results - page 154 / 174
» Sensor relocation in mobile sensor networks
Sort
View
SUTC
2008
IEEE
14 years 1 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
EDBT
2006
ACM
114views Database» more  EDBT 2006»
14 years 7 months ago
Resource Adaptive Periodicity Estimation of Streaming Data
Abstract. Streaming environments typically dictate incomplete or approximate algorithm execution, in order to cope with sudden surges in the data rate. Such limitations are even mo...
Michail Vlachos, Deepak S. Turaga, Philip S. Yu
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 2 months ago
Communication-aware motion planning in fading environments
— In this paper we create a framework to model and characterize the impact of time-varying fading communication links on the performance of a mobile sensor network. We propose co...
Yasamin Mostofi
MSN
2005
Springer
142views Sensor Networks» more  MSN 2005»
14 years 1 months ago
Efficient Multiplexing Protocol for Low Bit Rate Multi-point Video Conferencing
This paper discusses an efficient implementation of the multiplexing protocol H.223, which is an important part of 3G-324M protocol stack required for 3G mobile multimedia communic...
Haohuan Fu, Xiaowen Li, Ji Shen, Weijia Jia
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...