Sciweavers

PERCOM
2005
ACM
15 years 2 days ago
Supporting Topographic Queries in a Class of Networked Sensor Systems
Topographic querying is the process of extracting data from a sensor network for understanding the graphic delineation of features of interest in a terrain. Query processing techn...
Mitali Singh, Viktor K. Prasanna
PERCOM
2005
ACM
15 years 2 days ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
PERCOM
2005
ACM
15 years 2 days ago
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Hasan Çam, Hidayet Ozgur Sanli
PERCOM
2005
ACM
15 years 2 days ago
Towards a Pervasive Computing Benchmark
Pervasive computing allows the coupling of the physical world to the information world, and provides a wealth of ubiquitous services and applications that allow users, machines, d...
Anand Ranganathan, Jalal Al-Muhtadi, Jacob T. Bieh...
PERCOM
2005
ACM
15 years 2 days ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
PERCOM
2005
ACM
15 years 2 days ago
Autonomous Localization Method in Wireless Sensor Networks
In wireless sensor networks, localization systems use data from sensors which receive signals from moving targets, measure RSSI, and translate RSSI into the distance between senso...
Yoshikazu Ohta, Masashi Sugano, Masayuki Murata
PERCOM
2005
ACM
15 years 2 days ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
PERCOM
2005
ACM
15 years 2 days ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
PERCOM
2005
ACM
15 years 2 days ago
Hybrid Context Model Based on Multilevel Situation Theory and Ontology for Contact Centers
Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relation...
Anupama Kalyan, Srividya Gopalan, V. Sridhar
PERCOM
2005
ACM
15 years 2 days ago
Trading Latency for Energy in Wireless Ad Hoc Networks Using Message Ferrying
Power management is a critical issue in wireless ad hoc networks where the energy supply is limited. In this paper, we investigate a routing paradigm, Message Ferrying (MF), to sa...
Hyewon Jun, Wenrui Zhao, Mostafa H. Ammar, Ellen W...