In this paper we study a pursuit problem in the context of a wireless sensor network, where the pursuer (i.e., mobile sink) trying to capture a pursuee (i.e., tracked object), movi...
Battlefield surveillance often involves a high element of risk for military operators. Hence, it is very important for the military to execute unmanned surveillance by using larg...
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensor...
In this paper, we present the results of a two-month field study of fifteen people using a software tool designed to model changes in a user’s availability. The software uses s...