Sciweavers

858 search results - page 159 / 172
» User Authentication in Sensor Networks
Sort
View
ICNP
2000
IEEE
13 years 11 months ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin
IADIS
2003
13 years 8 months ago
Using Opnet Modeler to Analyse Galileo Communication Networks
Galileo is a European initiative to develop and deploy an independent global satellite-based navigation system. It consists of a Medium Earth Orbit sat ellite constellation transm...
Filipa Borrego, Juan-Antonio Martinez Rosique, Man...
WWW
2007
ACM
14 years 8 months ago
Optimized query planning of continuous aggregation queries in dynamic data dissemination networks
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Krithi Ramamritham
TKDE
2012
487views Formal Methods» more  TKDE 2012»
11 years 9 months ago
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
—Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of som...
Rajeev Gupta, Krithi Ramamritham
TC
2008
13 years 7 months ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin