Sciweavers

93 search results - page 12 / 19
» percom 2007
Sort
View
PERCOM
2007
ACM
14 years 10 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
PERCOM
2007
ACM
14 years 10 months ago
Wireless Bonding for Maximizing Throughput in Multi-Radio Mesh Networks
To enhance the per node throughput, mesh nodes in wireless mesh networks can be equipped with multiple network interfaces (NIC). In this paper, we propose a new multi-interface equ...
Sung-Ho Kim, Young-Bae Ko
PERCOM
2007
ACM
14 years 10 months ago
Exploring Non Uniform Quality of Service for Extending WSN Lifetime
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
Anna Egorova-Forster, Amy L. Murphy
PERCOM
2007
ACM
14 years 10 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
PERCOM
2007
ACM
14 years 10 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen