Sciweavers

AINA
2007
IEEE
14 years 5 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
AINA
2007
IEEE
14 years 5 months ago
Performance Evaluation of Multicast Cost Sharing Mechanisms
In this paper we investigate experimentally the performance of Marginal Cost (MC) and Shapley Value (SH) mechanisms for sharing the cost of multicast transmissions. We implement a...
Nandan Garg, Daniel Grosu
AINA
2007
IEEE
14 years 5 months ago
Fighting Erosion in Dynamic Large-Scale Overlay Networks
Roberto Baldoni, Silvia Bonomi, Leonardo Querzoni,...
AINA
2007
IEEE
14 years 5 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
AINA
2007
IEEE
14 years 5 months ago
Data Stream Based Algorithms For Wireless Sensor Network Applications
Abstract— A wireless sensor network (WSN) is energy constrained, and the extension of its lifetime is one of the most important issues in its design. Usually, a WSN collects a la...
André L. L. de Aquino, Carlos Mauricio S. F...
AINA
2007
IEEE
14 years 5 months ago
Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...
Bin Guo, Michita Imai
AINA
2007
IEEE
14 years 5 months ago
An Adaptive Localized Algorithm for Multiple Sensor Area Coverage
— Wireless sensor networks are made up of hundreds of devices deployed over a distant or sensitive field to be monitored. Energy consumption is balanced by taking advantage of t...
Antoine Gallais, Jean Carle
AINA
2007
IEEE
14 years 5 months ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong
AINA
2007
IEEE
14 years 5 months ago
A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems
Embedded signal processing system is a typical type of application in embedded domain. Such systems typically have requirements on high real-time responsiveness and large buffer c...
Nan Guan, Mingsong Lv, Qingxu Deng, Ge Yu
AINA
2007
IEEE
14 years 5 months ago
DHTs over Peer Clusters for Distributed Information Retrieval
Distributed Hash Tables (DHTs) are very efficient for querying based on key lookups, if only a small number of keys has to be registered by each individual peer. However, building...
Odysseas Papapetrou, Wolf Siberski, Wolf-Tilo Balk...